Download Appendix A (Acronym) - AFCEA International

Document related concepts

Computer and network surveillance wikipedia , lookup

Transcript
Version 1.0 8 July 2013
Appendix A
(Acronym)
Acronym
A&L
ACAT
ACF
AD
ADP
ANA
ANW2
AO
ARFOR
ARFORGEN
ASA(ALT)
ATIA
ATO
ATTP
AV
BCCS
BCT
BFT
BLOS
BN
BOI
BOIP
BY
C2OTM
C4ISR
CBRN
CC
CCJO
CD
CDD
CEOI
CFD
CKT
CIO
CNR
COIs
Meaning
Admin & Logistics Nets
Acquisition Category
Application Configuration Files
Asset Distribution
Army Doctrine Publication
Army NetOps Architecture
Advanced Networking Wideband Waveform
Area Operation
Army Forces
Army Force Generation
Assistant Secretary of the Army for Acquisition, Logistics, and
Technology
Army Training Information Architecture
Authority to Operate
Army Tactics Techniques Procedures
Asset Visibility
Battle Command Common Services
Brigade Combat Team
Blue Force Tracking
Beyond Line-Of-Sight
Battalion
Basis of Issue
Basis of Issue Plan
Base Year
Command and Control On the Move
Command, Control, Communications, Computers, Intelligence,
Surveillance, and Reconnaissance
Chemical, Biological, Radiological, and Nuclear
Communication Check
Capstone Concept for Joint Operations
Conduct Diagnostics
Capability Development Document
Communications-electronic Operating Instructions
Conduct Fault Diagnostics
Crypto Key Tag
Chief Information Officer
Combat Net Radio
Communities of Interest
A1
Version 1.0 8 July 2013
Acronym
COMSEC
CMD
CONOPS
COP
COTS
CP
CPOF
CPD
CS
CSR
CSR
CU
DAA
DAGR
DF
DIA
DIACAP
DISR
DNS
DNS
DoD
DoD IEA
DOTMLPF
DS
DSSA
DTD
DTSS
DTP
E2E
E3
EKMS
EMC
EME
EMP
EMS
EPLRS
EoL
ER
ESH
EUD
EW
FCAPS
Meaning
Communications Security
Command Net
Concept of Operations
Common Operational Picture
Commercial off the Shelf
Command Post
Command Post of the Future
Capability Production Document
Capability Set
Communications Status Reports
Commanders Support Requirements
Component Updates
Designated Approving Authority
Defense Advanced Lightweight GPS Receiver
Determine Fault
Defense Intelligence Agency
Defense Information Assurance Certification and Accreditation
Process
DOD Information Technology Standards Registry
Discover Network Specifics
Domain Name Service
Department of Defense
Defense Information Enterprise Architecture
Doctrine, Organization, Training, Materiel, Leadership/Education,
Personnel and Facilities
Determine Solution
Discover Signal Support Architecture
Data Transfer Device
Digital Topographic Support System
Detailed Technical Procedures
End to End
Electromagnetic Environmental Effects
Electronic Key Management System
Electromagnetic Compatibility
Electromagnetic Environment
Electromagnetic Pulse
Electromagnetic Spectrum
Enhanced Position Location Reporting System
End of Life
Execute Restoration
Environmental, Safety and Health
End User Device
Electronic Warfare
Fault, Configuration, Accounting, Performance, and Security Model
A2
Version 1.0 8 July 2013
Acronym
FDD
FIRES
FY
FBCB2
FOB
FREQ
FYDP
GES
GHz
GIG MA ICD
GOTS
GPETE
GPS
GPU
HBSS
HCI
HCLOS
HEMP
HERO
HF
HIC
HMI
HMS
HSI
IA
IATO
IAW
ICD
IF
IFRC
IMI
INFOSEC
IP
IPSS
IS
ISO
ISP
ISR
IT
ITNE
IW
JACS
JBC-P
Meaning
Functional Description Document
Fires Net
Fiscal Year
Force XXI Battle Command Brigade and Below
Forward Operating Base
Frequencies
Future Year Defense Plan/Program
Global Information Grid Enterprise Services
Giga-Hertz
Global Information Grid (GIG) Mission Area (MA) Initial Capabilities
Document (ICD)
Government Off the Shelf
General Purpose Electronic Test Equipment
Global Positioning System
General Purpose User
Host Based Security Services
Human-Computer Interface
High Capacity Line of Sight
High Altitude Electromagnetic Pulse
Hazards of Electromagnetic Radiation to Ordnance
High Frequency
High Intensity Conflict
Human Machine Interface
Handheld Manpack Small Form Fit
Human Systems Integration
Information Assurance
Interim Authorization to Operate
In Accordance With
Initial Capabilities Document
Isolate Fault
Identify Fault Root Cause
Interactive Multi-media Instruction
Information Security
Internet Protocol
Internet Protocol Security Services
Information Systems
International Standard Organization
Information Support Plan
Intelligence, Surveillance and Reconnaissance
Information Technology
Integrated Tactical Networking Environment
Information Warfare
Joint Automated CEIO System
Joint Battle Command - Platform
A3
Version 1.0 8 July 2013
Acronym
JCA
JCIDS
JENM
JFC
JIC
JIIM
JOC
JOpsC
JROC
JTF
J-TNT
JTRS
KHz
KPP
KSA
LOS
LNA
LORA
LOS
LRU
LTI
LWN
MANET
MARFOR
MEDVAC
MC
MCF
MCE
MDMP
METT-TC
MGRS
MHz
MNVR
MI
MOS
MP
MS
MTOE
NATO
NB
NBCC
NCE
NCOE
Meaning
Joint Capability Areas
Joint Capability Integration Development Document
JTRS Enterprise Network Manager
Joint Functional Concept
Joint Integrating Concept
Joint, Interagency, Intergovernmental, and Multinational
Joint Operating Concept
Joint Operations Concepts (JOpsC)
Joint Requirements Oversight Council
Joint Task Force
Joint Tactical Networking Toolkit
Joint Tactical Radio System
Kilohertz
Key Performance Parameter
Key System Attribute
Line of Sight
LWN NetOps Architecture
Levels of Repair Analysis
Line-Of-Sight
Line/Lowest Replaceable Unit
Lower Tactical Internet
LandWarNet
Mobile Ad hoc Networking
Marine Forces
Medical Evacuation Net
Mission Command
Mission Configuration Files
Mounted Computing Environment
Military Decision Making Process
Mission, enemy, terrain and weather, troops and support
availability, time available, civilians
Military Grid Reference System
Mega-Hertz
Mid-Tier Networking Vehicular Radio
Management Interface
Military Occupational Series
Monitor Parameters
Mission Command
Modified Table of Organization and Equipment
North Atlantic Treaty Organization
Narrow Band SATCOM
Nuclear, Biological, Chemical and Contamination
Network Centric Environment
Net-Centric Operational Environment
A4
Version 1.0 8 July 2013
Acronym
NCOP
NCOW
ND
NDI
NeMC
NET
NetOps
NIE
NIST
NIPRNET
NM
NMS
NP
NRA
NSA
NSS
NW
OE
ONI
OPNET
OPORDSA
ORD
OS
OTNR
O&I
OV
P3I
PBL
PBO
PE
PM
PNT
PLGR
QoS
Radio Nets
RBSA
RF
RFN
RNCF
RPC
RPPA
RN
RNM
RT
Meaning
Network Common Operational Picture
Net-Centric Operations and Warfare
Network Design
Non-Developmental Item
Net-enabled Mission Command
New Equipment Training
Network Operations
Network Integration Exercise
National Institute of Standards and Technology
Non-classified Internet Protocol Network
Network Management
Network Management System
Network Plan
Network Router Architecture
National Security Agency
National Security System
Nett Warrior
Operating Environment
Office Of Naval Intelligence
Operational Network
Operations Order Signal Annex
Operational Requirements Document
Operating System
Over the Air Network Rekey
Operations & Intelligence Net
Operational View
Preplanned Product Improvement
Performance Based Logistics
Property Book Officer
Program Element
Program Managers
Positioning, Navigation and Timing
Precise Lightweight GPS Receiver
Quality of Service
Radio Networks
Radio Based Situational Awareness
Radio Frequency
Radio Frequency Network
Radio Network Configuration File
Radio Platform Preset Change
Radio Platform Preset Architecture
Role Name
Role Name Modification
Radio Template
A5
Version 1.0 8 July 2013
Acronym
SA
SAASM
SANR
SATCOM
SAR
SBCT
SCORM
SDK
SDR
SINCGARS
SKL
SNAP
SoS
SPETE
SIPRNET
SRW
SSA
STANAG
STAR
STRAP
SW
TA/A
TACT
TADSS
TAR
TCM
TE
TIA/EIA
TIGRNET
TRADOC
TRANSEC
TSG
TOC
TRL
TPE
TS
TSS
TSP
TTP
UG
UHF
URN
USJFCOM
Meaning
Situational Awareness
Selective Availability Anti-Spoofing Module
Small Airborne Networking Radio
Satellite Communications
Satellite Access Request
Stryker Brigade Combat Team
Sharable Content Object Reference Model
Software Development Kit
Software Defined Radio
Single Channel Ground and Airborne Radio System
Simple Key Loader
SIPRNET / NIPRNET Access Point
System of Systems
Special Purpose Electronic Test Equipment
Secret Internet Protocol Network
Soldier Radio Waveform
Signal Support Architecture
Standardization Agreement (NATO)
System Threat Assessment Report
System Training Plan
Software
Trend Analysis / Archiving
Trend Analysis Complier Tool
Training Aids, Devices, Simulators and Simulations
Trend Analysis Report
TRADOC Capability Managers
Tactical Edge
Telecommunications Industry Association/Electronic
Association
Tactical Ground Reporting Network
Training and Doctrine Command
Transmission Security
Tactical Service Gateway
Tactical Operation Center
Technology Readiness Level
Theater Provided Equipment
Top Secret
Talk Selector Switch
Training Support Package
Tactics, Techniques and Procedures
User Group
Ultra High Frequency
Unit Reference Number
United States Joint Forces Command
Industries
A6
Version 1.0 8 July 2013
Acronym
USR
UTI
UTR
VCB
VM
VM Ware
WAN
WIN-T
WIT
WNW
Meaning
Unit Status Report
Upper Tactical Internet
Unit Task Reorganization
Voice Call Book
Virtual Machines
Virtual Machines Software
Wide Area Network
Warfighter Information Network - Tactical
Warfighter Initialization Tool
Wideband Networking Waveform
A7
Version 1.0 8 July 2013
Left Blank
A8
Version 1.0 8 July 2013
Appendix B
(Glossary)
Term
Administrative
Management
Phase
Ancillary Devices.
Analysis Process
Definition
The Administrative Management Phase of the ITNE Management
Process includes those functions that add, change, modify, delete,
and/or update administrative information within the MCF. The
cause for these administrative changes are as simple as adding a
new soldier or as complex as executing a unit task reorganization
(UTR).
The ancillary networking devices subcomponent of the ITNE is
composed of those networking devices that enable the routing and
dissemination of voice and data across the lower and mid tier
network. This passage of information can occur as part of the
signal data required to load and initialize the ITNE or as mission
command data during operations. Ancillary networking devices
provide the means to extend and interconnect separate logical
networks across IP, waveform, spectrum, and COMSEC
boundaries. The following are examples of ancillary networking
devices:
Tactical Routers: Any Tier 2 or Tier 3 IP device that
facilitates the routing of voice and data traffic across the ITNE and
operates as an organic asset to the ITNE (Battalion’s Network).
Gateways: Any Tier 2 or Tier 3 IP device that provides a
bridge between policy divergent networks through the filtering and
processing of distinct message traffic.
Cross Domain Solutions: Any Tier 2 or Tier 3 IP device that
provides a bridge between security separated networks through
the filtering and processing of message and COMSEC traffic.
Data Load Devices: Any device that can receive ITNE
network plans, configurations, COMSEC, and spectrum from the
NetOps Management System and load them into ITNE
subcomponent devices.
The Analysis Process of ITNE Signal Operations involves four
steps that leverage the information and data collected during the
Planning and Management Processes. The Analysis Process
begins at any point but for purposes of illustration is shown in this
CONOPS as a third process because it leverages the data
collected in the first two processes of ITNE Signal Operations.
Analysis is always ongoing and there is no limitation to conducting
the Analysis Process concurrently with the Planning or
Management Processes so long as the S-6 has the staff, time, and
the data is relevant within the context of the mission planning
cycle.
B1
Version 1.0 8 July 2013
Term
Advanced
Networking
Waveform
(ANW2):
Application
Configuration Files
(ACF)
Availability.
Bridge.
Broadcast.
Capability
Definition Package
(CDP)
Capability
Package (CP)
Definition
Designed to provide mid capacity voice and data exchange for
tactical edge users in the mid-tier of the ITNE.
The S-6 builds the ACF, files composed of mission command
specific application data needed to map the application to the
transport layer of the radio platform, from data within the Network
Design.
The measure of the degree to which a system is operable and
capable of initiating a mission at an unknown (random) time.
Availability defines the percentage of time that a system or item of
equipment is operational in accordance with a minimum set of
prescribed operational or functional specifications or criteria.
Space segment availability reflects the space segment’s ability to
meet the threshold set of communications requirements as a
function of the connectivity key parameter.
A functional unit that interconnects two local area networks that
use the same logical link control procedure, but may use different
medium access control procedures.
One-way transmission from a single, uplink source to an area or
earth coverage downlink listening area.
An incremental product that provides the material developer a
specialized description of the capability need as understood from
the operational perspective with as much functional behavior detail
as needed to describe the warfighter context. It establishes the
operational boundaries for the discussion of the operational
requirements so the user and the materiel developer understand
what aspect of the capability need the requirements will address.
It consists of an incremental functional decomposition of the
operational requirements within the operational environment of the
intended IT/IS capabilities. Thus, the CDP defines the operational
requirements in a standardized way to deliver effective materiel
solutions.
The CP is a further decomposition of one or more requirements in
a CDP that provides the material developer with the operational
context and functional behavior detail of an operational
requirement so that it can be developed within an agile project
management sprint. It will provide appropriate performance
metrics associated with the requirements to ensure they are built
to user-defined performance specifications. It will also provide
more detailed operational context so that the developer and tester
(as well as the user) understand the operational environment and
the operational processes that the IT capability (release or version)
will provide in terms of information management, exchange and
security. This document provides the encompassing operational
B2
Version 1.0 8 July 2013
Term
Channel
Operational
Availability Ao.
Coalition
Wideband
Networking
Waveform
(COALWNW):
Combat Net Radio
(CNR)
Communication.
Component.
Connectivity.
Cross Domain
Definition
environment and process environment, use cases, and functional
requirements decomposition for the next capability release. Of
critical importance is that the requirements are specifically
articulated to enable usable warfighter capability with each sprint
development and release.
Channel Ao is the proportion of time a channel is either operating
or is capable of operating when used in a specific manner in a
typical maintenance and supply environment. All calendar time
when operating in an approved operational scenario, is
considered. Channel Ao is defined as a measure of the degree to
which a channel is in an operable state at the start of a mission
when the mission is called for at a random point in time. Channel
Ao is a single overall measure of each channel of JTRS to remain
in a fully operational status when used in an approved operational
environment. All hardware (e.g., cables, power supply, antennas,
etc.) and software (e.g., configuration templates, waveform data
sets, crypto data input software, etc.) failures of a JTRS
configuration will be considered downing events in the evaluation
of channel Ao. Failures that render all channels down will impact
the Ao of each channel. Failures that prohibit the change/alteration
of a JTRS configuration as called for during an operational mission
will impact the Ao of the channels involved in the attempted action.
COALWNW is a multinational, cooperative effort to realize a
wideband, networking waveform to pass secure voice, video and
data among coalition partners. The new wideband networking
waveform will help U.S. and 8 coalition forces exchange secure
wideband voice, data and video using software defined radios
(SDR) in the land, air and sea domains.
CNR refers to the family of both single-channel and frequency
hopping (FH) radios which are organic to many types of units. In
maneuver battalions, CNR is their primary means of
communications.
Communication is information transfer, among Warfighters or
processes, according to agreed conventions.
A component is an assembly or part thereof that is essential to the
operation of some larger assembly and is an immediate
subdivision of the assembly to which it belongs
The ability to provide the requisite magnitude of the demanded
types of protected and unprotected throughput communications
services to the target user terminal populations as dispersed
and/or concentrated within the deployed geographical areas.
Connectivity encompasses coverage in terms of the physical
geometry between the satellite, the earth, and the user terminal
population; and capacity in terms of the relative data throughput.
Enables seamless tactical data communications (messages, video,
B3
Version 1.0 8 July 2013
Term
Solution (CDS)
Data Rates.
Data Collection
Phase
Domain.
Electromagnetic
Environmental
Effects (E3).
Embedded
Cryptography.
Enabling System
Definition
and audio) between two different security domains while
maintaining network security for each.
The aggregate rates at which data pass a point in the transmission
path of a system. LOW, MEDIUM and HIGH Data rates are further
defined in applicable MIL STDs for applicable waveform and
system usages.
The Data Collection Phase is the second phase of the ITNE
Planning Process and begins with the publication and availability
of the approved Signal Estimate and is completed when the S-6
receives all requested data associated with the Signal Estimate
required to build the detailed unit network design. There are eight
steps in the Data Collection Phase.
A domain is an independent variable used to express a function.
Examples of domains are time, frequency, and space. In a larger
sense, a domain is an area of common operational and functional
requirements. The variables that differentiate JTR domains are
the operating environment of user platforms on which JTR sets are
mounted. The three JTR domains are airborne, maritime/fixed,
and ground.
E3 is the impact of the electromagnetic environment upon the
operational capability of military forces, equipment, systems, and
platforms. It encompasses all electromagnetic disciplines,
including electromagnetic compatibility, electromagnetic
interference; electromagnetic vulnerability, electromagnetic pulse;
electromagnetic protection; hazards of electromagnetic radiation to
personnel, ordnance, and volatile materials; and natural
phenomena effects of lightning and p-static.
NSTISSI No. 4009 dated September 2000 defines embedded
cryptography simply as “Cryptography engineered into an
equipment or system whose basic function is not cryptographic.”
For JTRS context this means placement of a chip, module or
subsystem dedicated to performing cryptographic operations as a
component in communications or information processing
equipment in a certified manner. This cryptography or
cryptographic resource must interface with remaining JTRS
components in accordance with the Software Communication
Architecture and its supplements. It must also properly support
approved JTRS waveforms instantiated in/on the JTR set. Specific
physical location of the embedded cryptography is not defined by
the terms “embedded” or “JTRS compliant” since detailed
implementation approaches may vary. In a JTR set, embedded
cryptography cannot be realized by simply connecting to existing
legacy cryptographic hardware devices (such as KG-40, KG-84,
etc) or bulk/in-line encryptors.
A system that supports a system-of-interest during its life-cycle
B4
Version 1.0 8 July 2013
Term
Definition
stages but does not necessarily contribute directly to its function
during operation.
EPLRS provides terrestrial transport of battlefield situational
awareness to both the mobile user and their higher headquarters.
This information greatly enhances the command and control of
tactical units by providing commanders with the location of friendly
units, a dynamic representation of the Forward Line of Troops and
abbreviated SITREPs for conditions and identification of adjacent
Enhanced Position
equipped units. Self healing, self relaying Digital Network, used by
Location Reporting
ABCS and FBCB2 for Situational Awareness and Command and
System (EPLRS)
Control, Interoperable w/USMC PLRS and ANG/AF SADL
(Situational Awareness Data Link), Time Division Multiple Access,
Spread Spectrum, Frequency Hopping w/Forward Error
Correction, UHF 420-450 Mhz, and data rates up to 57 Kbps with
growth potential to 525 Kbps. EPLRS is currently used in
STRYKER BCTs.
The Fault Management Phase provides for the detection, isolation
Fault Management and resolution of network problems. The S-6 utilizes the Fault
Phase
Management Phase as an active listening capability on all ITNE
networked devices.
Functional
The Functional Description Document (FDD) defines the
Description
Wideband Networking Waveform (WNW) user requirements and
Document for the
specifications.
WNW.
A gateway in a communications network is a network node
equipped for interfacing with another network that uses different
protocols. A gateway may contain devices such as protocol
translators, impedance matching devices, rate converters, fault
isolators, or signal translators as necessary to provide system
Gateway.
interoperability. It also requires that mutually acceptable
administrative procedures be established between the two
networks. A protocol translation/mapping gateway interconnects
networks with different network protocol technologies by
performing the required protocol conversions.
The globally interconnected, end-to-end set of information
capabilities, associated processes, and personnel for collecting,
processing, storing, disseminating and managing information on
demand to Warfighters, policy makers, and support personnel. The
GIG includes all owned and leased communications and
Global Information
computing systems and services, software (including applications),
Grid (GIG).
data, security services, and other associated services necessary to
achieve information superiority. It also includes National Security
Systems as defined in Section 11103 of title 40, United States
Code (U.S.C.)). The GIG supports all DOD, National Security, and
related Intelligence Community missions and functions (strategic,
B5
Version 1.0 8 July 2013
Term
High Frequency
(HF)
Information
Operations.
Information
Superiority.
Information
System
Integrated Tactical
Networking
Environment.
Definition
operational, tactical, and business), in war and in peace. The GIG
provides capabilities from all operating locations (bases, posts,
camps, stations, facilities, mobile platforms, and deployed sites).
The GIG provides interfaces to coalition, allied, and non-DOD
users and systems. Includes any system, equipment, software, or
service that meets one or more of the following criteria:
•
Transmits information to, receives information from, routes
information among, or interchanges information among other
equipment, software, and services.
•
Provides retention, organization, visualization, information
assurance, or disposition of data, information, and/or knowledge
received from or transmitted to other equipment, software, and
services.
•
Processes data or information for use by other equipment,
software, or services.
•
Non-GIG IT. Stand-alone, self-contained, or embedded IT
that is not and will not be connected to the enterprise network.
Provides tactical elements with stand alone, terrain independent,
robust communications, for LOS and BLOS, secure voice and data
communications. Provides long distance, wide area, gap free, fixed
or on the move, ground and ground to air communications
The integrated employment, during military operations, of
information-related capabilities in concert with other lines of
operation to influence, disrupt, corrupt, or usurp the decisionmaking of adversaries and potential adversaries while protecting
our own. Also called IO.
The capability to collect, process, and disseminate an
uninterrupted flow of information, while exploiting or denying an
adversary's ability to do the same.
An information system consists of equipment that collects,
processes, stores, displays, and disseminates information. This
includes computers—hardware and software—and
communications, as well as policies and procedures for their use.
Staffs use information systems to process, store, and disseminate
information according to the commander's priorities. These
capabilities relieve the staff of handling routine data. Information
systems—especially when merged into a single, integrated
network—enable extensive information sharing.
Composed of five primary subcomponents. These include Radio
Platforms, Waveform Applications, Mission Command Mobile
Applications, Ancillary Networking Equipment, and the Network
Operations Management System. When combined, these
components form a complete system of systems network capability
enabling the commander to exchange secure and protected voice
and data across their formation. It is important to note that the
B6
Version 1.0 8 July 2013
Term
Integrated
Waveform (IW)
Inter-Networking.
Internet Protocol
(IP) Scheme
Interoperability
Categories.
Definition
ITNE is operational only when all components are fully initialized
and functioning. Failure of any one component can drastically
affect the overall ITNE capability. This can include a wide range of
network degradation from minor data exchange loss and/or delay
to catastrophic failure of the network to initialize. The ITNE is a
separate logical network that must operate autonomously as
required from the High Capacity Backbone (Warfighter Information
Network Tactical (WIN-T) network) to ensure full availability of
ITNE network resources during all phases of operation.
The SATCOM Integrated Waveform (IW) is an enhanced method
of multiplexing radios on the same channel. It uses carrier phase
modulation (CPM) to allow for more access on the same channel.
Inter-networking is the process of inter-connecting two or more
individual networks to facilitate communications between nodes of
the inter-connected networks. Each network may be distinct, with
its own addresses, internal protocols, access methods, and
administration. Individual networks connected to form a JTR internetwork will share the same general operating mode, i.e. voice,
data, or video.
The number of radios servers and workstations in your network
and need to support will affect several decisions you will need to
make. Some organizations require only a small network of serveral
dozen standalone machines. In other organizations, you may
need to set up a network with more than 1000 hosts. In cases
where you will need to support a large number of hosts, it may
require you to further divide your network into subdivisions called
subnets. The size of your prospective network will affect the:
Network class you apply for
Network number you receive
IP addressing scheme you use for your network
Wireless interoperability can generally be achieved by the use of
one of the following four categories:
•
Same Radio - (Direct interoperability, at least within the
same system or operational domain. Examples: SINCGARS
among ground forces, or JTRS among all services, etc.)
•
Common Waveform - (Direct interoperability, across
different domains or among different equipment. Example:
SINCGARS waveform between SINCGARS and JTRS radio sets.)
•
Gateways & Relays - (Indirect interoperability, and/or for
range extension (usually automatic), may include conversion of
frequencies, modes, protocols, cryptographic cover, etc., and may
be in real or non-real-time. See also “gateway” and “route and
retransmission.”)
•
Equipment Duplication - (Indirect interoperability (usually
B7
Version 1.0 8 July 2013
Term
Definition
manual), using multiple “stovepipe” radios, may be employed due
to time, operational, security, or other constraints, and often the
first (and usually inefficient) choice. Example: Stack of noninteroperable radios with very busy operator.)
The condition achieved among communications-electronics
systems or items of communications-electronics equipment when
information or services can be exchanged directly and
satisfactorily between them and/or their users. The degree of
Interoperability.
interoperability should be defined when referring to specific cases.
For example, interoperability could be established between a
SINCGARS voice net and another system voice net through a
transparent interface of a JTR set operating simultaneously in both
nets.
(JACS/ACES) provides pre-deployment and post mission planning
enabling the S6 staff to do legacy radio network planning to insure
interoperability of RF networks, cryptographic network planning,
and ANW2 (Harris) radio network planning. Electronic Protection
Joint Automated
(EP) data & radio network engineering for secure communications
Communications
is also part of the pre and post mission planning. The following are
Electronics
all generated by the J-TNT; Joint Communications Engineering
Operating
Operations Instruction (JCEOI), Communications Engineering
Instruction
Operations Instructions (CEOI), cryptographic key tag and
System/Automated TRANSEC Key generation. ACES also provides the capability to
Communications
support Black Key packaging & distribution, provides fills for the
Engineering
legacy DTD AN/CYZ-10 and Simple Key Loader AN/PYQ-10 (C)
Software
with secure net information directly or Over-the-Network. The
(JACS/ACES),
following radio types are supported by the J-TNT (JACS/ACES):
Harris Radios: Falcon III (AN/PRC-117G) and Falcon III (AN/PRC152A) ANW2 Only and All Legacy (SINCGARS, AN/PSC-5,
AN/PRC-150, etc.) Radio Sets in the Army inventory currently
used in CS13
Bowman provides a tactical voice and data communications
Joint Bowman
system for joint operations across the British Armed Forces in
Waveform (JBW)
support of land and amphibious operations.
System developed to support the joint Chiefs of Staff that define
Joint Capabilities
policies and procedures to identify, assess, and prioritize joint
Integration and
military capability needs as specified in title 10, United States
Development
Code, sections 153, 163, 167, and 181. For more information see
System.
CJCSI 3170.01F.
The main communications document used by the Joint Services is
Joint
the Joint Communication-Electronics Operating Instructions
Communication(JCEOI). A CEOI and standard operating instructions (SOI) are the
Electronics
same as a JCEOI but used in other applications, i.e. Army only,
Operating
NATO, etc. The JCEOI/CEOI is a series of orders issued by the
Instructions.
Commander for technical control and coordination of the signal
B8
Version 1.0 8 July 2013
Term
Joint Enterprise
Network Manager.
Joint Tactical
Radio System
(JTRS).
Key Performance
Parameter (KPP).
LandWarNet.
Link 16 Waveform
Line/Lowest
Replaceable Unit
(LRU).
Lower Tier
Management
Process
Definition
operations within the command. A JCEOI/CEOI normally contains
randomly generated call sign assignments, frequency
assignments, suffixes/expanders, signs and countersigns,
pyrotechnic/smoke signals and associated supplemental
instructions. The product includes complete listings of all
participants and their communications requirements. AKMS
provides tactical units and sustaining bases with an organic key
generation capability and an efficient secure electronic key
distribution means. AKMS provides a means for distribution of
Communications Security, Electronic Protection, and Signal
Operating Instructions information from the planning level to the
point of use in support of current and future forces.
JTRS Enterprise Network Manager (JENM) provides tactical
network management product for all JTRS radios. JENM enables
planning, instantiation, management and over-the-air
reconfiguration of tactical networks comprised of software-defined
radios from multiple vendors, greatly simplifying network planning
and operations as compared to using separate management
products provided by each qualified radio vendor.
JTRS is a generic reference to the system that encompasses the
aggregate of all aspects and components (including JTR Sets) that
constitute and enable the installation, operation, and maintenance
of the JTRS communications architecture. Unless explicitly stated
otherwise, in this CPD JTRS is a collective term that refers to the
entire system.
A KPP is performance attribute of a system considered critical to
the development of an effective military capability.
The Army’s portion of the Global Information Grid(GIG).
Link 16 Waveform: Link 16 is a TDMA-based secure, jamresistant high-speed digital data link which operates in the radio
frequency band 960–1,215 MHz, allocated in line with the ITU
Radio Regulations to the aeronautical radio navigation service and
to the radio navigation satellite service.
A module or assembly that is installed or removed from the JTR
Set by the operator/maintainer as a single serviceable entity.
The lower tier portion of the ITNE is composed of organic network
resources from each ITNE functional component designed to
support company and below formations down to soldier. This tier
is characterized by primarily single channel radios operating at
both the unclassified and secret level along with two channel
radios at platoon and company to ensure multi-network integration
and connectivity.
Provides the S-6 an ability to actively monitor the commander’s
network to ensure hardware and software faults are identified early
B9
Version 1.0 8 July 2013
Term
Mid Tier
Mission Command
(MC) Mounted /
Mobile
Applications.
Modular/Module.
Mission
Configuration Files
(MCF)
Mission Command
Mounted
Applications
Mission Command
Mobile
Applications
Definition
in the failure process and remedied prior to realization on the
operational network preventing loss of capability to combat forces.
Additionally, the S-6 is able to monitor performance and security
matters based on the METT-TC identified in the approved
commander’s operations order, ensure compliance, and correct
deficiencies during operations.
The mid tier portion of the ITNE is composed of organic network
resources from each ITNE functional component designed to
support battalion and company level operations. The mid tier is
the critical high capacity backbone of the radio environment. It
provides the battalion and company commander with the means to
process voice and larger amounts of data across their tactical
formation over a terrestrial based network.
The MC mounted / mobile applications subcomponent of the ITNE
is composed of those capabilities required to plan, configure,
manage, and monitor mobile MC applications. This includes the
addressing and alignment of the unit network data product to the
mobile handheld device hosting the application(s). Examples of
some of these capabilities include the Joint Battle Command
Platform (JBC-P) & Nett Warrior (NW) mission planning system
Modular pertains to a design concept in which interchangeable
units are used to create a functional product. A module is an
interchangeable subassembly that constitutes part of a larger
device or system. A modular system is constructed with
standardized units or dimensions for flexibility and variety in
operational use and cost-effective modifications to either hardware
or software. Modularity may be scaled to any system functional or
design level that promotes desired efficiency.
With the completion of the RNCF and ACF, the battalion S-6 now
has all the information necessary to compose the MCF. The MCF
is the all inclusive package of configuration files required to load
and configure ITNE network devices and mission command
applications.
Mounted Applications are divided into three categories. These
include Native, Web Services and Virtual Machines. Native
applications are built onto the Mounted Computing Environment
(MCE) software development kit (SDK) and share common
components, user interfaces, and communication methods (e.g.
GPS, JBC-P, etc.).
Mobile Applications are divided into two categories, those that run
natively on the mobile platform and those that are accessed as
Web Services. The Web Service is configured on a remote server
that the mobile device subscribes to with an IP address provided
by the controlling authority. Native mobile applications on the other
hand must be configured by the battalion S-6 with a planning tool.
B10
Version 1.0 8 July 2013
Term
Multilevel Security.
Multiple User
Objective System
(MUOS)
National Security
Systems (NSS).
Net-Enabled
Mission Command
(NeMC).
Network Load &
Verification Phase
Network
Management
System.
Network
Management.
Definition
Concept of processing information with different classifications and
categories that simultaneously permits access by Warfighters with
different security clearances and denies access to Warfighters who
lack authorization.
Waveform: Designed to provide mid capacity voice and data
exchange across narrowband SATCOM for BLOS range extension
of the low and mid tier terrestrial networks.
Those telecommunications and information systems operated by
the Department of Defense, the functions, operation or use of
which – (1) involves intelligence activities; (2) involves crypto logic
activities related to national security; (3) involves the command
and control of military forces; (4) involves equipment that is an
integral part of a weapon or weapons systems; or (5) is critical to
the direct fulfillment of military or intelligence missions. Subsection
(5) in the preceding sentence does not include procurement of
automatic data processing equipment or services to be used for
routine administrative and business applications (including payroll,
finance, logistics, and personnel management applications).
NeMC will align existing BC and C2 Programs –a loosely
coordinated set of disparate applications, services, and transport
networks to form a NeMC capability. This capability supports a
coherent and interoperable Enterprise Common Operating
Environment (COE) and the foundational characteristics outlined in
the Global Information Grid (GIG) 2.0 ICD. Specifically, Global
Authentication, Access Control, and Directory Services and
Information and services “from the edge.”
The Network Load & Verification Phase is the fifth and last phase
of the ITNE Planning Process. In this phase, the S-6 and
subordinate units load all mission network devices and mission
command systems with their specific MCF, initialize the network,
and conduct a communications check. At the end of this phase,
the S-6 provides a commander approved operational network
(OPNET) that meets and supports the identified information
exchange requirements.
Network Management System is a system of installed software on
computer-aided tools/devices used by network managers/network
operators to plan, manage, monitor, control, and optimize the
performance of a network(s).
Network management is execution of a set of functions required
for controlling, planning, allocating, deploying, coordinating, and
monitoring the resources of a telecommunication network.
Network management includes performing functions such as initial
network planning, frequency allocation, predetermined traffic
routing to support load balancing, cryptographic key distribution
authorization, configuration management, fault management,
B11
Version 1.0 8 July 2013
Term
Definition
security management, performance management, and accounting
management. Network management does not usually include
management of user terminal equipment (See also System
Management).
The ability to change one or more existing network parameters by
Network
means of network management (e.g., rekeying, changing
Reconfiguration.
waveform parameters, changing radio set parameters, etc.) to
adapt to changing mission requirements.
The S-6 creates the Network Routing Architecture (NRA) to
support the Network Plan (NP) highlighted in the Signal Estimate.
Terrestrial network as the primary route for network traffic and the
Network Routing
celestial network as the secondary route. Terrestrial prioritization
Architecture (NRA)
of mission command network traffic is essential to maintaining
local command and control of battalion data during periods of
network degradation.
A person, organization, or system that employs the services
Network User.
provided by a telecommunication network for transfer of user
information.
A network is an inter-connection of three or more communicating
Network.
entities.
The Network Build Phase is the fourth phase of the ITNE Planning
Process. In this phase, the S-6 uses the Network Design from the
previous phase and builds the Radio Network Configuration File
Network Build
(RNCF) and Application Configuration File (ACF). With the
Phase
completion of these two products, the battalion S-6 now has the
ITNE Mission Configuration File (MCF). The MCF includes all
network device and application configuration files required to
implement and execute the battalion’s mission network.
The Network Design Phase is the third phase of the ITNE Planning
Process and begins once all the requested network data is
received and the impact to any request denials are fully vetted and
approved by the commander and published in a final Signal
Estimate. Using the received ITNE data, the battalion S-6
Network Design
formulates an IP scheme and a Network Routing Architecture
Phase
(NRA). The battalion S-6 then finalizes the SSA and the RPPA by
applying the IP scheme, network routing architecture, frequencies,
narrowband SATCOM, and COMSEC data. The completion of this
phase is a published Signal Annex to the battalion operations
order that establishes the ITNE Network Design (ND). There are
six steps in the Network Design Phase.
Describes the use of a system that constantly monitors a computer
network for slow or failing components and that notifies the
Network
network administrator (via email, SMS or other alarms) in case of
Monitoring:
outages. It is a subset of the functions involved in network
management.
B12
Version 1.0 8 July 2013
Term
NetOps
Management.
Networking
Services.
Node.
Normal
Operations.
Performance
Management
Phase
Planning Process
Definition
The NetOps Management subcomponent of the ITNE is the
integrated capability that allows network managers to plan,
configure, manage, and monitor all other subcomponents of the
ITNE. This includes radio platforms, MC mobile applications,
ancillary networking devices, and waveform applications. The
NetOps management system is the critical subcomponent that
enables the S-6 staff to plan and build a network plan and initialize
and operate the radio network for each respective command level.
The ITNE capabilities for NetOps provide enhanced shared
situational awareness of the network. This awareness is critical to
preparing and reacting to adversary information operations and
enhances the effectiveness and operation of SRW/ANW2 based
networks and MC mobile applications.
Provide functions to perform data routing, bridging, switching, link
layer message processing, including multimedia processing,
network management, and gateway services. Scalable services
are also required to provide flexibility for Service-specific, platform
and form factor needs.
A general term used to describe either a terminal connection point
common to two or more branches of a network; a switch forming a
network backbone; patching and control facilities; technical control
facilities.
Normal operations are generally and collectively, the broad
functions that a combatant commander undertakes when assigned
responsibility for a given geographic or functional area. Except as
otherwise qualified in certain unified command plan paragraphs
that relate to particular commands, normal operations of a
combatant commander include: planning and execution of
operations throughout the range of military operations; planning
and conduct of cold war activities; planning and administration of
military assistance; and maintaining the relationships and
exercising the directive or coordinating authority prescribed in JP
0-2 and JP 4-01.
The Performance Management Phase of the ITNE Management
Process consists of measuring and optimizing the network to
ensure it can support the flow of voice and data traffic according to
the quality of service priorities established by the commander.
Performance management offers a foundation for pro-active
management of ITNE component devices.
The Planning Process of ITNE Signal Operations involves five
phases that cover all activity required by the S-6 staff. This
includes everything from the receipt of their commander’s
operations order to the verification that the commander’s network
is initialized and fully operational. The five Planning Process
phases include the Planning Analysis Phase, the Data Collection
B13
Version 1.0 8 July 2013
Term
Platform.
Radio Platforms.
Radio Network.
Radio Network
Configuration File
(RNCF)
Radio Based
Situational
Awareness.
Definition
Phase, the Network Design Phase, the Network Build Phase, and
the Network Load/Verification Phase. In total, these five phases
include thirty separate steps
A host (e.g., weapon system, ship, aircraft, vehicle, dismounted
Warfighter, etc.) that contains a mounted/integrated JTR Set.
The Radio Platform subcomponent of the ITNE is composed of
legacy and newly developed tactical radios. The ITNE is made up
of many different radios with varying capabilities. This radio
variety is due to the fact there is no one radio that meets all of the
line of sight (LOS), beyond line of sight (BLOS), and terrain and
vegetation obstacles under which our forces must operate. This
means the Army will continue to operate the ITNE with a variety of
radios with varying capabilities that when collectively combined
create a robust lower and mid tier network transport capability for
the ITNE. More fundamentally, the Radio Platform subcomponent
of the ITNE is a combination of the hardware design inherent to
the radio and the operating environment software utilized by the
radio to allow interaction between those hardware components
and the NetOps Management and the Waveform Application
subcomponents of the ITNE.
An interconnection of two or more radio sets communicating with
each other, but not necessarily on the same channel or frequency
(e.g. a multi-channel network that may choose one or more
available channels for a communications session between its
nodes.
The S-6 builds the RNCF, a Microsoft Excel spreadsheet
consisting of tabs with fields and columns, which is populated with
radio network data from the Network Design and compiled by the
ITNE NMS to produce specific radio configuration files that are
later loaded onto software defined radios.
A software capability within the SINCGARS RT-1523 radios and
Radio Based Combat ID (RBCI) Responder Boxes that enable
them to automatically broadcast Position Location Information
(PLI) to other radios when connected to a Global Positioning
System (GPS) device. Each radio acts as a beacon and can send
Situational Awareness (SA) periodically based on time, distances
traveled, or Push-To-Talk (PTT) transmission. Key operational
benefits are increased battle space visibility and creates a more
complete ―blue‖ picture; supports fratricide avoidance and
clearance of fires when used with RBCI; no user intervention is
required to beacon the position; uses current fielded SINCGARS
RT-1523 equipment; RBCI Responder Box supports RBSA and is
available to coalition forces. KEY FEATURES: SINCGARS RT1523 radios with GPS can automatically send SA position
information for display on FBCB2 and other C2 systems;
B14
Version 1.0 8 July 2013
Term
Radio Platform
Preset
Architecture
(RPPA)
Radio Based
Situation
Awareness
Monitoring
(RBSAM)
Remote.
Route and
Retransmission.
Role Name
Satellite Access
Request (SAR)
Scalable.
Security
Management
Phase
Definition
demonstrated at Bold Quest to allow disadvantaged units to
provide PLI without any additional equipment; supports JBC-P
Beacon requirement in the JROC approved JBC-P CDD.
RPPA will be tied to the creation of the Signal System Architecture
(SSA) through the more automated and over the network enabled
ITNE NetOps management system.
(RBSAM) provides radio monitoring services for deployed ANW2
and SRW networks in two fashions, the primary monitoring
software application for radio situational awareness is through the
Radio Based Situational Awareness Software application. This
software allows the S-6 to see all of radios in the net base upon
echelon.
(In context of JTRS control and management) by means of nonintegral, detached, or other distal means, such as remote control
panel, JTRS network management system, or similar distant
control device, normally linked to the JTR Set by wired, wireless,
or optical means.
The capability to route and retransmit between waveform networks
that have the same security level, compatible serial data rates,
Internet Protocol (IP) Packets, analog voice, and voice vocoders
for Linear Predictive Coding LPC-10e, Mixed Excitation Linear
Predictive (MELP) and Continuous Variable Slope Delta (CVSD).
The S-6 submits a role name request to the issuing agency or
controlling authority in accordance with current policies and
regulations based on the title and position of each user per radio
platform in the Signal Estimate. The RN identifies and associates
a soldier to each respective radio platform.
The S-6 submits a narrowband satellite access request (SAR) to
the issuing agency or controlling authority in accordance with
current policies and regulations for all narrowband SATCOM
networks captured in the Signal Estimate.
In this context means the JTR Set/System using an open system
architecture is capable of being adjusted upward or downward via
software, hardware, or firmware to support Warfighter’s current
and future missions. Scalable allows for technology
insertion/growth capability without requiring
reengineering/redesigning of the JTR Set/System. Scalable
provides the Warfighter with the ability to reconfigure the JTR
Set/System to meet mission requirements.
The Security Management Phase of the ITNE Management
Process involves all activities that the S-6 undertakes to protect
ITNE component device value, usability, data integrity, and
continuity of operations. The staff must effectively identify threats
and then choose the most effective ITNE NMS tool to combat
B15
Version 1.0 8 July 2013
Term
Definition
them.
A portable, hand-held fill device, for securely receiving, storing,
and transferring data between compatible cryptographic and
communications equipment. Developed by SAIC under the
auspices of the United States Army and the National Security
Agency, it is intended to supplement and eventually replace the
AN/CYZ-10 Data Transfer Device (DTD). The PYQ-10 provides all
Simple Key Loader
the functions currently resident in the CYZ-10 and incorporates
(SKL) AN/PYQ-10.
new features that provide streamlined management of COMSEC
key, Electronic Protection (EP) data, and Signal Operating
Instructions (SOI). The SKL is backward-compatible with existing
End Cryptographic Units (ECU) and forward-compatible with future
security equipment and systems, including NSA's Key
Management Infrastructure.
A sequence of coded instructions that can be inserted/loaded into
Software
a computer hardware system; e.g., a software load for waveforms
Programming.
can be loaded into the radio set hardware configuration.
The Signal Analysis Phase is the first phase of the ITNE Planning
Process and begins with the receipt of the commander’s approved
mission course of action to include the approved task organization.
The S-6 staff then analyzes the mission command requirements
and translates them into the Signal Estimate. The S-6 uses the
mission variables of Mission, Enemy, Troops, Terrain, Time, and
Signal Analysis
Civilians (METT-TC) to identify specified tasks, implied tasks,
Phase
network constraints, assets available, and commander support
requirements in order to develop the Signal Support Architecture
(SSA) and the Radio Platform Preset Architecture (RPPA) for
ITNE. The Signal Estimate published at the completion of this
phase contains the SSA and the RPPA. There are six steps in the
Signal Analysis Phase.
Signal Estimate
Signal Operations
Signal System
Architecture
Single Channel
By publishing the Signal Estimate, the battalion S-6 provides the
battalion staff and subordinate commanders a signal support
warning order that identifies signal equipment and confirms their
operational status to meet the commander’s mission command
needs.
ITNE signal operations are the specific set of tasks and functions
performed by the S-6 staff enabling all of the ITNE component
capabilities to perform according to the commander’s intent within
the boundaries of METT-TC. ITNE signal operations include a
planning, management, and analysis process.
SSA is nothing more than a connectivity diagram illustrating the
signal asset overlay on the approved unit task organization
structure.
SINCGARS is a family of VHF-FM radio sets designed to meet the
B16
Version 1.0 8 July 2013
Term
Ground and
Airborne Radio
System
(SINCGARS):
Software Defined
Radio (SDR)
Soldier Radio
Waveform (SRW)
System
Management.
System of
Systems
Tactical Edge
Tactical
Communications
System.
Tactical Satellite
Definition
Army’s tactical communications requirements. The radios are
designed for simple, quick operation. SINCGARS are capable of
short-range or long-range operation for voice, frequency shift
keying (FSK), or digital data communications.
The SDR is designed with the radio OE and the waveform
application physically separated from one another. This allows for
the standardization of the waveform application across multiple
radio platforms greatly reducing the complexity of the waveform
environment. It also allows for the simplification of network
planning of the waveforms through the standardization of the
network management interface to the waveform application. In
essence, the standardization of the waveform application and that
applications disassociation from the radio OE enable the
employment of a single network management approach to the
ITNE.
Designed to provide limited voice and data capability for tactical
edge users. SRW is primarily viewed as a company and below
waveform.
System management extends network management functions to
include subscriber elements or user end instruments in cases
where separate system management is not provided directly by
user nodes.
A set or arrangement of interdependent systems that is related or
connected to provide a given capability. The loss of any part of the
system will degrade the performance or capabilities of the whole.
System of Systems Engineering deals with planning, analyzing,
organizing, and integrating the capabilities of a mix of existing and
new systems into a SoS capability greater than the sum of the
capabilities of the constituent parts (Defense Acquisition
Guidebook, 1 November 2012).
Derived from the NCOE term of the “first tactical mile”, which refers
to warfighter directly involved in executing the mission at the “tip of
the spear.” First tactical mile users may be an individual Soldier,
squad, platoon, company, aircraft, vehicle or ship, or any unit
executing the mission in a forward deployed position (NCOE JIC).
A tactical communications system is used within or in direct
support of tactical forces and is designed to meet the requirements
of changing tactical situations and varying environmental
conditions. It provides securable communications (e.g. voice,
data, and video) among mobile Warfighters to facilitate command
and control of tactical forces. A tactical communications system
usually requires extremely short installation times in order to meet
the requirements of frequent relocation.
Tactical Satellite (TACSAT) Radios: A small lightweight man-pack
B17
Version 1.0 8 July 2013
Term
(TACSAT) Radios:
Transmission
Security
(TRANSEC).
Unit Task
Reorganization
(UTR)
Unit Reference
Number (URN)
Waveform.
Waveform
Applications.
Definition
Multiband Multimode radio (VHF and UHF) that provides
Command and Control (C2) communications for the Corps and
Division War Fighter and supports the Army Special Operations
Forces C2, in war, and in operations other than war.
A component of COMSEC resulting from the application of
measures taken to protect transmissions from interception and
exploitation by means other than cryptanalysis (Cryptanalysis is
defined as “Operations performed in converting encrypted
messages to plain text without initial knowledge of the cryptoalgorithm and /or key employed in the encryption.). Transmission
security is the protection of the communications paths against
attack. Defensive measures include anti-jam, low probability of
detection, low probability of intercept, spread spectrum techniques
such as frequency hopping and direct sequence spreading, and
protected distribution.
A UTR is the process performed by an S-6 staff upon receipt of the
commander’s Operations Order during combat operations that
translates mission command MDMP task organization changes
into specific actions required by the S-6 to modify the
communications (Voice/Data) network to match the modified unit
structure. The UTR process follows the ITNE Planning Process
and results in a modified NP, ND, and MCF along with the updated
Signal Estimate and Signal Annex for the operations order.
The URN is a unique, numerical identifier assigned to and required
by each software-defined radio for situational awareness reporting.
A waveform is the representation of a signal that includes the
frequency, modulation type, message format, and/or transmission
system. In general usage, the term waveform refers to a known
set of characteristics, for example, frequency bands, modulation
techniques, message standards, and transmission systems. In
JTRS usage, the term waveform is used to describe the entire set
of radio functions that occur from the user input to the RF output
and vice versa. A JTRS "waveform" is implemented as a reuseable, portable, executable software application that is
independent of the JTRS operating system, middleware, and
hardware.
The Waveform Application subcomponent of the ITNE is
composed of all current and future tactical waveform applications
that provide a means to pass voice and/or data across the
transport layer of the network in both the lower and mid tier
portions of the ITNE. Waveform applications are peer-to-peer
programs that facilitate the exchange of application data across
the spectrum of radio networks. Each waveform application is
B18
Version 1.0 8 July 2013
Term
Wide-Band.
Wide Band
Networking
Waveform (WNW)
Definition
optimized to meet the mission needs of the portion of the network
on which it operates (low/mid).
Soldier Radio Waveform (SRW): Designed to provide
limited voice and data capability for tactical edge users. SRW is
primarily viewed as a company and below waveform.
Wideband Networking Waveform (WNW): Designed to
provide high capacity data exchange for tactical edge users in the
mid-tier and serve as an interoperability link with Upper Tier
networks like WIN-T.
Advanced Networking Waveform (ANW2): Designed to
provide mid capacity voice and data exchange for tactical edge
users in the mid-tier of the ITNE.
Multiple User Objective System (MUOS) Waveform:
Designed to provide mid capacity voice and data exchange across
narrowband SATCOM for BLOS range extension of the low and
mid tier terrestrial networks.
A wide band circuit may have a bandwidth wider than normal for
the type of circuit, frequency of operation, or type of modulation. In
common usage, "wide-band" refers to a high capacity for
information transfer. In JTRS usage, wide-band refers to a
networked radio waveform that has a node-to-node capacity for
information transfer of 512 Kbps or greater.
Designed to provide high capacity data exchange for tactical edge
users in the mid-tier and serve as an interoperability link with
Upper Tier networks like WIN-T.
B19
Version 1.0 8 July 2013
Left Blank
B20
Version 1.0 8 July 2013
Appendix C
(References)
1.0 Joint Requirements Oversight Council (JROC) approved documents: The basis of
the ITNE capability requirements:
1.0.1 Joint Tactical Radio System (JTRS) Operational Requirements Document (ORD)
1.0.1.1 Joint Enterprise Network Manager (JENM)
1.0.1.2 Mid-Tier Networking Vehicular Radio (MNVR)
1.0.1.3 Airborne Maritime Fixed Radio (AMF)
2.0 JTRS Capability Production Document (CPD)
2.0.1 Manpack
2.0.2 Rifleman Radio
2.0.3 Mid-Tier Network Vehicle Radio
2.0.4 Airborne Maritime Fixed Radio
3.0 Army Key Management System (EKMS) ORD
3.0.1 Joint Automated Communications-electronics Operating Instructions (CEOI)
Software (JACS)
3.0.2 Simple Key Loader (SKL)
4.0 Joint Battle Command – Platform (JBC-P) CPD
4.0.1 Radio Based Situational Awareness (RBSA) Monitor
5.0 CONCEPTS
5.0.1 Joint Operation Access CONCEPT version 1.0 17 Jan 2012
5.0.2 Gaining and Maintaining Access: An Army – Marine Corps CONCEPT Mar 2012
5.0.3 Tactical Wireless Joint Network (TWJN) CONCEPT of Operation version 1.0 Apr
2007
5.0.4 WIN-T Inc 1B and Inc 2 NETOPS CONOPS June 2012
5.0.5 Draft Army Enterprise NETOPS CONOPS version 0.6 June 2012
5.0.6 Nett Warrior Handbook CONCEPT of Employment
6.0 Doctrine
6.0.1 FM 3-0 Operations
6.0.2 FM 3-21.20 The Infantry Battalion Dec 2006
7.0 Special Text
7.0.1Draft ST 6-02.24 Electronic Reference
C1
Version 1.0 8 July 2013
Left Blank
C2
Version 1.0 8 July 2013
Appendix D
(Multinational Interoperability)
Appendix M Multinational Interoperability will be completed on a future update of the
ITNE CONOPS
D1
Version 1.0 8 July 2013
Left Blank
D2
Version 1.0 8 July 2013
Appendix E
(Radio Platforms)
1.0 Radio Platforms: The radio platforms of the ITNE are composed of all legacy and
newly developed software defined radios (SDRs). A brief description of each radio is
provided within this appendix. The Army radio platform inventory changes over time as
new radios are introduced and old radios are transitioned. At all times, the radio
platform component of the ITNE is a mix of many legacy and software defined radios.
The radio variety is the result of a need to provide a capability to meet all possible
mission requirements associated with line of sight (LOS), beyond line of sight (BLOS),
and terrain and vegetation obstacle conditions under which Army Forces must operate.
No single radio can provide the ability to access all the potential spectrum, provide the
bandwidth, nor support the number of networks while still meeting all the size, weight,
and power requirements of each type of user. This requires the Army to operate the
ITNE with a variety of radios with varying capabilities that when collectively combined
create a robust lower and mid tier network transport capability for the ITNE. The
Battalion S-6 and their staff must possess a thorough understanding of each radio type
along with the strengths and weaknesses of each radio across the operational
spectrum.
A radio is a device that enables Soldiers push-to-talk capabilities utilizing various
frequencies and waveforms, enabling both voice and data to be transmitted and
received over large distances. The Radio Platform component is a combination of the
hardware design inherent to the radio that includes: radio, batteries, microphone,
antennas, IO Device, amplifiers, GPS, vehicular, man-pack or base mounts, encryption
devices, and the software design inherent in the radio operating system. The radio
operating environment software allows the interaction between the radio hardware
components and the NetOps and Waveform Applications component software. In the
legacy radios, the hardware and software design are fully integrated within the radio and
include the waveform. In software defined radios, the hardware and software are less
rigidly coupled. This provides an SDR greater interoperability with waveform
applications and network management tools while also minimizing interoperability
issues associated with enhancing the radio platform operating environment.
The Radio Operational Environment software is a foundational capability within the
SDRs of the ITNE and if not properly version controlled with other functional component
software can easily disrupt or prevent the initialization and operation of the ITNE. The
Battalion S-6 must ensure that all versions of the software associated with the radio
platform are compatible and complimentary through regular validation checks via the
published ITNE Help Desk. Details regarding the ITNE Help Desk are available in
Appendix M.
E1
Version 1.0 8 July 2013
2.0 Legacy/Enduring Radio Platform Design: The legacy/enduring radio platform
design is focused on the complete integration of the radio operating environment and
the waveform capability. Most legacy/enduring radio platforms are non-digital in nature
and operate on an analog infrastructure. Legacy/enduring radio platforms offer
consistency of design, reliability, availability, and maintainability at the expense of
improved performance over time and rigidity in the network design of each radio
platform type. The primary value of the legacy/enduring radio platform is reliability to
meet mission needs and the familiarity and level of training soldiers already possess on
most of these systems.
Legacy/enduring radio platforms will continue to endure within formations where critical
node connectivity must be assured and rapid and reliable data dissemination is required
for such disciplines as Command and Control, Fires, Aviation, and Medical. The
following are examples of legacy/enduring radio platforms that will persist within Army
formations.
2.1 Single Channel Ground and Airborne Radio System (SINCGARS): SINCGARS
is a family of VHF-FM radio sets designed to meet the Army’s tactical communications
requirements. The radios are designed for simple, quick operation. SINCGARS are
capable of short-range or long-range operation for voice, frequency shift keying (FSK),
or digital data communications. They can be used for single-channel operation or in a
jam-resistant, Frequency Hopping (FH) mode that can be changed, as needed.
SINCGARS Radios and Capabilities
2.1.1 RT 1439: Non-Integrated COMSEC radio was the first SINCGARS Combat Net
Radio produced to replace the older VRC-12 series radios. This radio required an
external KY-57 COMSEC device to encrypt the traffic message being transmitted over
the air.
Figure E1 (SINCGARS Radio RT 1439)
E2
Version 1.0 8 July 2013
2.1.2 RT 1523 A/B: SINCGARS ICOM provides network data services in both mounted
and dismounted configurations. In the mounted role the radio works with the ITT internet
controller to provide robust mobile ad hoc network data services. As a man-pack the
radio provides a standard PPP interface allowing a C2 application to access the Tactical
Internet.
Figure E2 (SINCGARS ICOM Radio RT 1523 A/B)
2.1.3 RT 1523 C/D: SINCGARS SIP used with the Tactical Internet to support the Army
program for digitization of the battlefield. It is the same physical size as the previous
radio, but incorporates advanced capabilities including forward error correction, higher
data rates, packet technology, and the Internet Controller.
Figure E3 (SINCGARS SIP Radio RT 1523 C/D)
2.1.4 RT 1523 E/F: SINCGARS ASIP Incorporates programmable digital signal
processing technology and is significantly smaller than the existing radio. It is
redesigned and more user-friendly, man-machine interface via flat panel technology.
New feature provides a retransmission capability while operating in the packet data
mode and will employ a new, fast-channel access protocol for improved operations in
shared voice or data nets.
E3
Version 1.0 8 July 2013
Figure E4 (SINCGARS ASIP Radio RT 1523 E/F)
2.1.5 AN/PRC 119: SINCGARS Man-pack version provides the capability of
establishing two-way communications (comms) (including jam-resistant) using the
SINCGARS waveform. Provides multi-mode voice and data comms.
Figure E5 (SINCGARS Man-Pack Radio AN/PRC 119)
E4
Version 1.0 8 July 2013
2.2 Enhanced Position Location Reporting System (EPLRS): EPLRS provides
terrestrial transport of battlefield situational awareness to both the mobile user and their
higher headquarters. This information greatly enhances the command and control of
tactical units by providing commanders with the location of friendly units, a dynamic
representation of the Forward Line of Troops and abbreviated SITREPs for conditions
and identification of adjacent equipped units. Self healing, self relaying Digital Network,
used by ABCS and FBCB2 for Situational Awareness and Command and Control,
Interoperable w/USMC PLRS and ANG/AF SADL (Situational Awareness Data Link),
Time Division Multiple Access, Spread Spectrum, Frequency Hopping w/Forward Error
Correction, UHF 420-450 MHz, and data rates up to 57 Kbps with growth potential to
525 Kbps. EPLRS is currently used in STRYKER BCTs. There is currently a hold by
congress on buying anymore EPLRS radio and will be replaced in the future buy a
software programmable radio using Wideband Network Waveform (WNW)
EPLRS is currently used as the mid-tier terrestrial MANET backbone data network.
EPLRS is being replaced by SDR waveform applications (WNW & SRW) but the
transition will take time and EPLRS will support maneuver brigades that use terrestrial
backbone to support FBCB2. The EPLRS network consists of EPLRS radio sets (RSs)
mounted on vehicle that have a mission command application (FBCB2) or a small
handheld radio used at maneuver platoon level networking the soldier as a system
(SAAS) and one or more EPLRS Network Manager (ENM) host computers. The RSs
automatically route and deliver user messages and provide multiple concurrent
communication paths known as needlines.
EPLRS Radios and Capabilities
2.2.1 RT-1720: Robust, self healing network architecture, externally programmable
firmware and software, automatic mesh networking, jam resistant, and laptop based
network monitoring and management.
Figure E6 (EPLRS Radio RT-1720)
E5
Version 1.0 8 July 2013
2.2.2 RT-1915: Extended Frequency (EPLRS-XF) provides a wireless Internet Protocol
(IP) network for tactical forces on the move using Type-1 security. Supports a diverse
range of applications, such as low-latency voice, sensor netting, blue force tracking and
e-mail. Supports a wide variety of missions – from air defense to maneuver control and
beyond. Quality of Service (QoS) is maintained for each application via Time Division
Multiple Access (TDMA). IP-based, mobile ad-hoc networking (MANET), robust, selfhealing network architecture, externally programmable firmware and software,
automatic mesh networking and highly accurate time of flight derived positioning.
Figure E7 (EPLRS-XF Radio RT-1915)
2.3 RT-1922: Micro-Light Man-Portable Radio Provides tactical internet connectivity for
VOIP and SA for the Nett Warrior ensemble. It is small, Internet Protocol (IP) based
data radio that can be used for a host of applications. It is a self contained radio device
with an option of industry standard host interfaces. Unsecured voice communication,
remote capability. Range 10 + KM.
Figure E8 (Micro-Light Man-Portable Radio RT-1922)
E6
Version 1.0 8 July 2013
2.4 DH500: MicroLight-DH500 Personal Network Device Software defined radio.
Exploits 2G by hosting EPLRS and Soldier Radio Waveform (SRW), can be used in the
Nett Warrior ensemble but designed for use independent from Nett Warrior ensemble. It
is compatible with ASIP –E running EPLRS or SRW and EPLRS vehicular radios. SCA
compliant integrated VoIP.
Figure E9 (Micro-Light Radio DH500)
2.5 High Frequency (HF) Provides tactical elements with stand alone, terrain
independent, robust communications, for LOS and BLOS, secure voice and data
communications. Provides long distance, wide area, gap free, fixed or on the move,
ground and ground to air communications. HF is the only terrestrial BLOS system that
requires a good understand of HF frequency and antenna design to support local to
BLOS requirements. These are typically used as a backup radio system.
2.5.1 High Frequency (HF) Single Side Band (SSB): HF is currently the only
terrestrial BLOS capability available in the tactical network. It is used mostly as a
redundant backup C2 system to counter jamming in other frequencies or distance. SDR
will support this waveform. HF propagation requires an understanding of the radio,
power capability of the radio, the frequency to be use on the radio and the distance you
are planning to reach on the radio determines the type of antenna (Whip, NVIS, or
Doublet).
2.5.2 AN/PRC 150: Man-pack for LOS/BLOS, secure voice and data communications.
Provides long distance, wide area, gap free, fixed or on the move, ground and ground to
air communications. The radio provides plain text, secure analog voice with robust data
E7
Version 1.0 8 July 2013
and digital voice modes. Supports advanced serial tone ECCM modem IP networking.
Has Red and Black key management and ALE link protection. Frequency hopping,
frequency range 1.6 to 59.999 MHz, Power 1,5,20 watts PEP/Average, Type 1
Encryption.
Figure E10 (HF Radio AN/PRC 150)
2.5.3 RF-5800H: Advanced HF/VHF Man-pack supporting HF-SSB/VHF-FM man-pack
radio that provides reliable tactical comms through enhanced secure voice and data
performance, networking, and extended battery life. Supports encrypted data, automatic
link establishment (ALE), frequency hopping, vocoder, data link layer protocol (ARQ),
internal GPS, integrated telephony capability and network management features.
Figure E11 (Advance HF/VHF Radio RF-5800H)
E8
Version 1.0 8 July 2013
2.5.4 AN/VRC-100: A multifunctional, fully digital signal processing (DSP) high
frequency radio intended for a variety of ground or mobile applications. It is fully
integrated “Plug and Play” multi-mode voice or data communications system configured
in a portable case. It allows substantial distance communications beyond line of sight by
providing users an ability to maintain contact during short, mid, and long range
operations. It is also an advanced data communications system capable of providing
reliable digital connectivity.
Figure E12 (Advance HF Ground/Vehicular Radio AN/VRC-100)
2.5.5 AN/PRC-104: IHFR Man-pack provides long-range CNR connectivity between
operational elements at all echelons of the Army. It is primarily used as back-up
communications, in the event the ACUS or organizational unique communications
networks fail. It is capable of transmitting and receiving voice and data and must be
externally secured through the use of the KY-99 MINTERM COMSEC device. The radio
is a low power (20 W) system configured for man-pack operations.
Figure E13 (IHFR Man-Pack Radio AN/PRC-104)
E9
Version 1.0 8 July 2013
2.6 Single Channel Tactical Satellite (TACSAT) Radios: A small lightweight manpack Multiband Multimode radio (VHF and UHF) that provides Command and Control
(C2) communications for the Corps and Division War Fighter and supports the Army
Special Operations Forces C2, in war, and in operations other than war. It provides both
wideband and narrowband range extension for both voice and data. The Beyond Line of
Sight Range extension capability is utilized in the Army’s SATCOM-On-The-Move OE563 functionality in moving vehicular platforms (versus stationary).
2.6.1 RT 1672/U(C): AN/PSC-5 (Spitfire) A small lightweight man-pack Multiband
Multimode radio (VHF and UHF) that provides Command and Control (C2)
communications for the Corps and Division War Fighter and supports the Army Special
Operations Forces C2, in war, and in operations other than war. It provides both
wideband and narrowband range extension for both voice and data. The Beyond Line of
Sight Range extension capability is utilized in the Army’s SATCOM-On-The-Move OE563 functionality in moving vehicular platforms (versus stationary). Provides DAMA and
Narrowband Secure Voice, LOS Communications for both Voice & Data, Supports
Command & Control on the move (C2OTM) Extends SINCGARS Communications
when paired with SINCGARS as a Retransmission Unit
Figure E15 (AN/PSC-5 (Spitfire) RT 1672/U(C))
E10
Version 1.0 8 July 2013
2.6.2 RT-1672D(C) AN/PSC-5C (Shadowfire) the AN/PSC-5C terminal provides all the
features of the AN/PSC-5 Spitfire terminal plus additional ECCM, COMSEC, and
networking capabilities. It operates in the VHF and UHF frequency spectrum and
supports LOS with frequency agile modes, SATCOM, DAMA, and Maritime operation.
Voice and data operation is available in each of these modes. SATCOM including
DAMA, Enhanced MELP Vocoder & Improved LPC, Anti-jam Communications,
OTAR/OTAT Capable and Software Programmable
Figure E16 (AN/PSC-5 (Shadowfire) RT 1672/D(C))
2.6.3 AN/PRC-117F: Multiband Radio multi-mission ground-to-ground, ground-to-air,
and ground-to-satellite. Has powerful retransmit capabilities with advanced waveforms.
HPW (advanced SATCOM messaging) 181B (High speed SATCOM), Embedded
Internet Protocol. Interoperable with legacy systems, reprogrammable software,
vehicular, man-pack and Base station configurable, embedded COMSEC, SATCOM,
and ECCM capabilities.
Figure E17 (AN/PRC-117F Multiband Radio)
E11
Version 1.0 8 July 2013
2.6.4 AN/PRC-117G: Multiband Radio with SAASM Software defined tactical radio that
provides breakthrough wideband data performance and interoperability with fielded
waveforms. The radio has a JTEl-certified Software Communications Architecture
(SCA) operating environment. The 117G provides the optimal transition to softwaredefined radio technology. Features JTEL-certified SCA, operates in narrow, wide, and
UHF SATCOM waveforms, embedded SAASM GPS, stores multiple mission fill files,
extending the time between reconfigurations.
Figure E18 (AN/PRC-117G Multiband Radio)
E12
Version 1.0 8 July 2013
3.0 Software Defined Radio (SDR) Platform: The SDR is designed with the radio OE
and the waveform application physically separated from one another. This allows for
the standardization of the waveform application across multiple radio platforms greatly
reducing the complexity of the waveform environment. It also allows for the
simplification of network planning of the waveforms through the standardization of the
network management interface to the waveform application. In essence, the
standardization of the waveform application and that applications disassociation from
the radio OE enable the employment of a single network management approach to the
ITNE.
Pursuant to the goals established by the Defense Planning Guidance (1998–2003) and
Joint Vision 2020, Joint Tactical Radio System (JTRS) will be designed as an
interoperable family of advanced software-reprogrammable, multi-band, multi-mode,
net-centric, and reliable communications radio sets. The JTRS sets must interoperate
with current equipment used by military land, air, and maritime defense forces. The
JTRS Ground Domain has two Programs of Record: the Handheld, Man-pack, and
Small Form Fit (HMS) and Mid-Tier Network Vehicular Radio (MNVR)
The SDR hardware platform consists of some key components that enable the radio to
function as a transmission device as well as a computing device. These include the
Radio Frequency (RF) Module (RFM), Signal Processing Module (SPM), and the
General Purpose Processing Module (GPM). Figure 3 illustrates the relationship
between these components within the SDR.
Figure E20 (Software Programmable Radios and Capabilities)
E13
Version 1.0 8 July 2013
3.1 Handheld Man-pack Small Form Fit (HMS) there are three radio types within the
JTRS HMS program: the hand-held Rifleman radio, the Man-pack radio, and the Small
Form Fit radio (for unmanned aerial and ground systems). The handheld Rifleman is a
single-channel radio that uses Type 2 cryptography and operates with the Soldier Radio
Waveform (SRW). It will initially be fielded to individual riflemen within Infantry Brigade
Combat Teams (BCT), and could also be fielded to infantry Soldiers in Heavy and
Stryker BCTs. The Nett Warrior handheld radio is a Secret and below single channel
radio that will be fielded to dismounted leaders using Nett Warrior application device for
SA. The Man-pack radio is a more powerful two-channel radio that provides better
performance and range for use at the lowest echelon, and can be carried on the back of
a Soldier or mounted in a vehicle. In addition to operating over SRW, it will also operate
over the Mobile User Objective Waveform (MUOS), as well as versions of legacy
waveforms that include Single Channel Ground and Airborne Radio Systems
(SINCGARS); Enhanced Position Location Reporting System (EPLRS); Ultra High
Frequency (UHF) Satellite Communication (SATCOM); and High Frequency (HF). In
addition, the Man-pack radio is being designed as both a National Security Agency
(NSA) Type 1 and Type 2 certifiable radio, so it has stronger encryption then the
Rifleman radio and can operate over a classified network.
3.1.1 AN/PRC-154: The AN/PRC-154 “Rifleman Radio” (RR) is a single-channel radio
capable of transmitting and receiving push-to-talk voice and data communications
simultaneously using the Soldier Radio Waveform (SRW). RR is a Type 2 NSA certified
radio capable of handling controlled unclassified information. It provides intra-squad
voice communications and automatic position location information (PLI) beaconing for
command and control (C2).
Figure E21 (Rifleman Radio AN/PRC-154)
3.1.2 AN/PRC-154A Radio: The Nett Warrior Radio (NW-R) is a Secret and Below
single-channel radio capable of transmitting and receiving push-to-talk voice and data
communications simultaneously using the Soldier Radio Waveform (SRW). NW-R is a
Type 1 NSA certified radio capable of handling secret information. It provides team
leader and above voice communications and automatic position location information
E14
Version 1.0 8 July 2013
(PLI) beaconing for command and control (C2).
Figure E22 (Nett Warrior Radio AN/PRC-154A)
3.1.3 AN/PRC-155: Mounted and dismounted 2-Channel sets running SRW,
SINCGARS, UHF SATCOM DAMA, Type 1/Type 2 encryption and GPS/SAASM. Future
upgrades could include WNW, MUOS, FH, and EPLRS.
Figure E23 (Man-pack Radio AN/PRC-155)
3.1.4 SFF-B: Small Form Fit Two Channel Radio running SRW, SINCGARS, and
EPLRS waveforms with Type 1/Type 2 encryption and GPS/SAASM.
E15
Version 1.0 8 July 2013
Figure E24 (SFF-B)
E16
Version 1.0 8 July 2013
3.2 Mid-Tier Network Vehicular Radio (MNVR) is a software-definable, two channel,
multimode communications system that is compliant with the Software Communications
Architecture (SCA). Through software reconfiguration, the JTRS MNVR can emulate
and interoperate with current force radios (SINCGARS) as well as operate new
waveforms (WNW, and SRW).
Picture Not Available
Figure E25 (MNVR Radio (Place Holder))
3.3 Airborne, Maritime, Fixed Station (AMF) Provides Army Aviation with software
reprogrammable multi-band/multi-mode capable, networking communications.
Waveforms will include WNW, SRW, Link16 and MUOS
Figure E26 (AMF Radio)
E17
Version 1.0 8 July 2013
4.0 Software Defined Radio in the Operating System: The SDR operating system
organizes and controls both hardware and software allowing the central processing unit
(CPU) of the radio the flexibility to manage a variety of different applications within the
radio’s program. The operating system provides a software platform capable of running
multiple applications simultaneously and will stabilize the applications to operate within
the hardware configuration. Each individual application receives the necessary
resources to operate by interacting with other applications within the CPU. The CPU
manages the memory, storage and the input/output bandwidth of the various programs.
The operating system of the SDR is comprised of multiple basic components that
include but not limited to: Processor management, memory, device, storage
management and application, user interface, file system, drivers, networking, security
(process/memory protection), I/O (input/output bandwidth).
Figure E27 (Operating System Flow Chart)
4.1 Radio Hardware: The hardware components of software defined radio consist of
all the internal boards, chips, wiring and interconnected equipment that forms the radio
system. It supplies the physical platform resources that house all associated software
programs.
Figure E28 (Voice/Data Path through Radio)
System Integration Unit (SIU) - Used for Human interfacing with the SDR Consists of:
knobs, controls, keypads, audio and serial ports)
E18
Version 1.0 8 July 2013
Core Processor: Provides analog to digital conversion takes place either at the output
of the radio frequency/intermediate frequency (RF/IF). The digital signal processing is
digitized from the original signal by applying the inversed of modulation transformation.
(Contains: RF/IF, Modem, link processor)
Red: non-encrypted information flow
AIM (Advanced INFOSEC Module): Cryptographic Module for encryption and decryption
of message traffic.
Black: encrypted information flow
PA: (Power amplifier) amplifies the signal send thru the antenna
Antenna: sends and receives the energy (signal) as an RF into the system.
4.2 Operating System: The operating system of a software defined radio is a written
program, built into the radio that allows the user to manipulate and command the
functions of the radio through different programs and appliqué. The program is built to
organize and control the hardware and software which provides the radio the capability
to function across a multitude of radio frequency (RF) networks. It gives the radio the
ability to integrate and run various applications simultaneously. The operating system
stabilizes applications to work with the hardware components of the radio. Each
application receives the necessary resources by interfacing with other applications from
the central processing unit (CPU) which manages the memory, storage and input/output
bandwidth of the various programs. The software defined radio’s operating system
allows for upgrades to all software and applications internal to the radio with minimal
physical changes.
The operating system consists of a minimum of six basic components: Processor
management, memory/security management, device management, storage
management and application, and user interface.
4.3 Applications: The software defined radio uses a number of applications within the
operating system environment to execute the necessary functionality between the
hardware and software to enable a specific task or service. Applications can be written
specific enough to effect one particular component of the SDR or broad enough to
control multiple components working together.
Application Program Interfaces (APIs) provide the defined standard through which the
operating system and radio platform applications communicate within the radio platform.
APIs include but are not limited the following areas in a radio: modem hardware, audio
port, GPS, serial port, timing, data processing, IP routing service and waveforms.
Applications also come in the form of Special Protocols which can be point to point or
multicast. These applications form a bond with the OS and hardware to insure the
applications are sending and/or receiving the correct instructions to accomplish the
required tasks.
E19
Version 1.0 8 July 2013
Left Blank
E20
Version 1.0 8 July 2013
APPENDIX F
(Waveform & Waveform Applications)
1.0 Waveform & Waveform Applications: The Waveform Application functional
component of the ITNE is composed of all current and future software defined waveform
applications that provide a means to pass voice and/or data across the transport layer
of the network in both the lower and mid tier portions of the ITNE. Waveform
Applications are peer-to-peer programs that facilitate the exchange of application data
across the spectrum of radio networks. Each waveform application is optimized to meet
the mission needs of the portion on which it operates (low/mid tier). This means lower
tier waveforms cannot meet mid-tier requirements nor can mid-tier waveforms scale
easily to the lower tier. These are important considerations for ITNE planners as they
develop their network architecture to meet their commander’s mission command
requirements.
Waveform Applications are planned, configured, and loaded onto the radio platforms
through the NETOPS Management System and/or the Data Transfer Device. For near
term capability sets, an SDR must be loaded with the waveform application through this
means in order for that radio platform to be initialized and operational within that
waveform environment. In the future, over the network (OTNR) distribution of radio files
will simplify and expedite the process of loading and reloading radios in support of
Mission, Enemy, Terrain, Troops, Time and Civilian Considerations (METT-TC)
requiring new task organization and subsequent S-6 unit task reorganization (UTR)
procedures.
2.0 Lower Tier: Waveforms operating within the lower tier of the ITNE are optimized for
the processing of voice and basic data elements. The data elements within the ITNE
are centered on blue situational awareness, targeting (Ground and Airborne), and
Medical. The spectrum and bandwidth availability is limited and only critical mission
command functions operate within this portion of the ITNE. The key waveforms
operating within the lower tier are identified in Appendix F.
2.1 Soldier Radio Waveform (SRW):: The Soldier Radio Waveform (SRW) provides
the local area connectivity and communications services for unmanned systems and
small combat units to support interoperability between mounted BCT elements and
individual dismounted soldier organizational elements; missiles; intelligent munitions;
sensors; and robotics. The SRW network connects via gateways to the mid-tier
backbone which provides the range extension needed for seamless communications
across the entire battlefield.
SRW is a wideband (1.2 MHz), multi-hop, adaptive power, self forming and self healing
MANET. SRW can support up to 30 nodes in a single tier network supporting
simultaneously both data and 5 separate voice calling groups. SRW supports both
UNCLAS and Secret nets. Planning Range vary due to the radio platform used. A
F1
Version 1.0 8 July 2013
handheld range is 1-2 KM, a Man-pack range is 5 KM, a vehicle mounted platforms is
10 KM, and air to air/air to ground is 30-70 KM.
SRW Operational Modes: Combat Communication (CC): Currently most common
mode. High data rate 936 Kbps and 2Mbps burst rate. Electronic Warfare (EW):
Variable RF bandwidth, data rate 225 Kbps and 56 Kbps burst rates. Tele-Operation
(TO): Robotic Control data rate 936 Kbps and 2Mbps burst rate. Low Probability of
Interception/Low Probability of Detection (LPI/LPD): Specialized mode to support
limited data. SRW Gateway Capability: SRW Local Gateway: SRW can gateway
between other SRW networks of the same security classification (Tier 1A/1B gateway).
These gateways an identified in the planning stages. SRW Global SRW Gateway:
SRW can gateway to the mid-tier network (WNW) and connect SRW networks.
Proposed deployment:
Company SRW Net: The company will stand up a company Secret SRW network. The
participants would have the Commander, ISG, PLs, PSGs. The purpose of the network
is to provide the commander C2, SA and COP using (Nett Warrior) and Position
Location Information (PLI) down to platoon leadership. Annex F Waveform Applications
Figure xx illustrates a Company SRW Network.
Platoon SRW Net: The Platoon will stand up a platoon Secret SRW network. The
participants would be the PL, PSG, SQUAD LDRs, and Team LDRs. The purpose of
the network is to provide the Platoon Leader C2, SA and COP using (Nett Warrior) and
PLI down to platoon leadership. The Platoon SRW Nets are gateway to the Company
SRW providing the Company SA of the Platoon activity as well as providing updated SA
to the platoon from BN & CO. Annex F Waveform Applications Figure xx illustrates a
Platoon SRW Network.
Squad SRW Net: The Platoon will stand up a Squad UNCLAS network. The
participants would be the SQUAD LDRs, Team Leaders and Team members in the
platoon. The purpose of the network is to provide C2 and PLI. UNCLASS voice will not
be channeled through a gateway to a different network. However, the PLI is important
and with the uses of a one way guard the PLI will be pushed up to the Platoon Secret
SRW Net at key node points.
2.2 Single Channel Ground and Airborne Radio System (SINCGARS): SINCGARS
is a family of VHF-FM combat net radios which provides the primary means of
command and control for Infantry, Armor and Artillery Units via highly reliable, secure,
easily maintained Combat Net Radio (CNR) voice and data handling capability.
SINCGARS is designed on a modular basis to achieve maximum commonality among
the various ground and airborne system configurations. A common Receiver
Transmitter (RT) is used in the manpack and all vehicular configurations. SINCGARS
family of radios has the capability to transmit and receive voice, tactical data and record
traffic messages and is consistent with NATO interoperability requirements.
2.3 Mobile User Objective System (MUOS): MUOS is the narrowband military satellite
communications (MILSATCOM) component of the emerging DoD Transformational
Communications Architecture (TCA). Its primary user community is the tactical
Warfighter (land, sea, and air): typically on-the-move, beyond-line-of-sight (BLOS), in
F2
Version 1.0 8 July 2013
difficult terrain conditions, with small disadvantaged terminals. MUOS will provide
traditional UHF services such as push-to-talk combat nets and broadcast
communications plus new services such as net-centric connections (e.g., extending
command data networks and Defense Information Systems Network (DISN) services to
mobile users) and point-to-point (PTP) communications between tactical users or to
Defense Switched Network/Public Switched Telephone Network (DSN/PSTN) users. It
will be integrated into the Global Information Grid (GIG), providing assured and timely
transport across operational and tactical boundaries.
2.4 Joint Bowman Waveform (JBW): Bowman provides a tactical voice and data
communications system for joint operations across the British Armed Forces in support
of land and amphibious operations. It is fitted to over 15,000 military vehicles, from Land
Rover Wolf to the Challenger 2 Main Battle Tank. The entire Royal Navy fleet is fitted
with Bowman equipment and all the major helicopter types supporting land operations,
such as Apache, Chinook, Merlin and Lynx are fitted. Bowman features enhanced
communications security (COMSEC) through integrated voice and data encryption
devices and enhanced Electronic Protective Measures through features such as
frequency-hopping spread spectrum. The JBW allows U.S. Forces to communicate
directly and securely with U.K. allies using the Bowman VHF waveform on the
battlefield. JBW functionality enables users from both countries to work as a cohesive
team during combat operations, sharing situational awareness information more
efficiently and effectively, rather than using separate channels to pass information back
and forth.
3.0 Mid-Tier: Waveforms operating within the mid-tier of the ITNE are optimized for the
processing of voice and larger volumes of data elements. The data elements include
those of the lower tier but also those data elements required by other staff elements
within the battalion and headquarters elements. The data elements can include
map/terrain data, Engineers, Multi-national partners, Joint Services, Intelligence, and
Administrative. Although the mid-tier possesses more overall bandwidth to
accommodate these additional data requirements, the ITNE mid-tier is still limited in
what it can process when compared to BCT and higher headquarters Upper Tactical
Internet (UTI) high capacity options.
3.1 Wideband Networking Waveform (WNW) is a self-forming, self-healing, wireless
network that allows the Joint Services to communicate securely with each other in the
tactical battlefield as well as provides access to the Global Information Grid.
WNW is the battalion and below terrestrial data backbone. It will connect battalion and
below units together in a MANET self forming and self-healing IP data network. WNW
is design to provide a 2 Mbps IP data network supporting up to 1600 nodes in the midtier. WNW planning range is 10 KM between nodes. There are currently two SDRs
operating WNW. These are the Mid-Tier Networking Vehicular Radio (MNVR) and the
Man-pack. WNW is projected to be integrated into WIN-T terminals (TCN, PoP, & SNE)
providing a gateway point from the mid-tier into the LWN GIG. WNW provides no native
voice capability, but does support voice over Internet Protocol (VoIP). WNW operates
in two modes of operation Orthogonal Frequency Division Multiplexing (OFDM) or AntiJam (AJ). Supports robust dynamic IP routing protocols allows the WNW network to
F3
Version 1.0 8 July 2013
perform backbone routing & increased network scalability. Advanced QoS metrics
supports multi-level priority on voice, data, and video for assured service.
3.2 Adaptive Networking Wideband Waveform (ANW2): ANW2 is a wireless self
healing mobile ad-hoc networking (MANET) waveform that provides secure IP data and
simultaneous combat net radio voice to the tactical Internet at on-air rates up to 10
Mbps data. This high data rate-joined with mobile ad-hoc networking, automated
network establishment and maintenance, and integrated security-provides a powerful
networking solution.
ANW2 can currently support up to 30 nodes. The waveform operates on AN/PRC-117G
and PRC-152A only. ANW2 bridges separated networks that are beyond line of sight
through Broadband Global Area Network (BGAN)/ X Band SATCOM. ANW2 has a
planning range of 20KM terrestrial and 85 KM ground to air. ANW2 planned data rate
between 30 Kbps to 1680 Kbps depending on configuration
3.3 Mobile User Objective System (MUOS) Waveform: The Mobile User Objective
System (MUOS) MUOS is a UHF (64 kilobits per second [kbps] and below) SATCOM
system that will support a worldwide, multi-service population of mobile and fixed-site
terminal users. MUOS will provide a considerable increase over current UHF SATCOM
in terms of capability and capacity, as well as significant improvement in availability for
small, disadvantaged terminals. MUOS will ultimately replace the current UFO
constellation while continuing to support legacy UHF terminals through its legacy UHF
payload.
The MUOS design leverages Third Generation (3G) WCDMA commercial terrestrial
mobile telecommunications technology operating through the MUOS satellites to deliver
higher capacity and availability to the warfighter.
MUOS is comprised of a satellite constellation, a ground control and network
management system, and a new waveform for user terminals. The space segment will
be comprised of four geosynchronous satellites, plus one on-orbit spare. Each satellite
will carry two payloads; one that will offer UHF legacy capacity for users and one with
advanced, next-generation technology. The ground system includes the transport,
network management, satellite control and associated infrastructure to fly the satellites
and manage user communications. MUOS ground stations are located for optimal views
of the satellites as well as terrestrial connectivity to the rest of the ground network.
These ground sites are interconnected to switching centers located in Hawaii and
Virginia, which identify the destination of the communications and route the information
to the appropriate ground site for uplink to the satellite and UHF downlink to the correct
users. The Network Management Facility (NMF), located in Hawaii, will allow planning
and record keeping for MUOS operations. The network will feature governmentcontrolled, priority-based resource management adaptable and responsive to changing
operational requirements. When fielded, MUOS will provide access to select Defense
Information System Network (DISN) services, a voice and data capability that has not
been available to legacy UHF SATCOM users on prior systems. MUOS will use the
existing satellite control system operated by the Naval Satellite Operations Center
(NAVSOC) at Point Mugu, California. The Air Force Satellite Control Network (AFSCN)
F4
Version 1.0 8 July 2013
will serve as a back-up means for satellite control. MUOS ground stations are located at
Northwest, Virginia; Wahiawa, Hawaii; Niscemi, Sicily, Italy; and Geraldton, Australia.
Annex F Waveform Applications Figure xx illustrates a MUOS Network.
3.4 Tactical Single Channel Satellite (TACSAT): Designed to provide interoperability
between a legacy TACSAT radio and a SDR. This provides the ability to interoperate
with a legacy radio waveform’s voice and limited data exchange for BLOS tactical edge
users in the low/mid-tier.
3.5 Integrated Waveform (IW): The SATCOM Integrated Waveform (IW) is an
enhanced method of multiplexing radios on the same channel. It uses carrier phase
modulation (CPM) to allow for more access on the same channel. CPM was
implemented in radios to provide higher data throughput on the UHF dedicated satellite
channels in LOS mode. It is the replacement to Demand Assigned Multiple Access
(DAMA) SATCOM. It is a flexible waveform structure that allows communication
accesses to be tailored based upon operational need.
One channel is assigned as the master and contains the system forward orderwire
(SFOW). All other channels fall under the master channel and can be either 25-kHz or
5-kHz. Each channel has its own format that is changeable upon user demand. Time
slots for ranging and other communications can be arranged based on these same
requirements. Updates are also obtainable from preplanned update forward order-wires
(PUFOWs) transmitted on other channels.
The IW waveform structure allows communication access to be tailored based upon
operational need. With data rates up to 19.2 kbps, the IW provides up to 14 networks
operating at 2400 bps each. IW supports narrowband voice operations with mixed
excitation linear.
3.6 Coalition Wideband Networking Waveform (COALWNW): COALWNW is a
multinational, cooperative effort to realize a wideband, networking waveform to pass
secure voice, video and data among coalition partners. The new wideband networking
waveform will help U.S. and 8 coalition forces exchange secure wideband voice, data
and video using software defined radios (SDR) in the land, air and sea domains. The
coalition networking waveform will improve coordination among U.S. and coalition
forces and boost situational awareness for those forces in theater.
3.7 Link 16 Waveform: Link 16 is a TDMA-based secure, jam-resistant high-speed
digital data link which operates in the radio frequency band 960–1,215 MHz, allocated in
line with the ITU Radio Regulations to the aeronautical radio navigation service and to
the radio navigation satellite service. This frequency range limits the exchange of
information to users within line-of-sight of one another, although emerging technologies
provide the means to pass Link 16 data over long-haul protocols such as TCP/IP and
UHF SATCOM. It uses the transmission characteristics and protocols, conventions, and
fixed-length or variable length message formats defined by MIL-STD 6016, STANAG
5516 (formerly the JTIDS technical interface design plan). Information is typically
passed at one of three data rates: 31.6, 57.6 or 115.2 kilobits per second, although the
F5
Version 1.0 8 July 2013
radios and waveform itself can support throughputs upwards of 238 kbit/s.
4.0 Near Term (CS 13/14) Software Defined Radio Waveform Design: The current
ITNE ground radio communications domain currently consists primarily of two
networking waveforms. The Adaptive Networking Wideband Waveform (ANW2)
provides wide area connectivity and communications services for aerial platforms,
mounted and dismounted users and supports interoperability between the ITNE lower
and mid Tier. The Soldier Radio Waveform (SRW) provides lower tier connectivity and
services for unmanned systems, aerial platforms and small mounted and dismounted
users.
4.1 ITNE Ground Domain Network: The ITNE ANW2 and SRW domains provides a
dynamic, scalable, mobile network architecture for tactical network communications.
ANW2 provides the necessary large scale, highly mobile wide area backbone which
interconnects lower tier SRW stub networks to form the ITNE network. This ground
domain network has Dynamic Internet Protocol (IP) routing, IP encryption, IP Quality of
Service (QoS) for GIG interoperability and leverages advantaged nodes to enhance
network scalability and performance. All of this allows SRW to provide critical tactical
edge connectivity.
ANW 2
Mid Tier
Figure F1 (The ITNE Ground Domain Network)
4.2 Soldier Radio Waveform Application (WFA) Defined: SRW is a Joint Tactical
Radio System (JTRS) software defined waveform that operates on the Red Side of such
Joint Tactical Radio (JTR) sets as the AN/PRC 155, AN/PRC 117G and AN/PRC 154 to
provide a networked battlefield communications capability for disadvantaged users
engaged in land combat operations and supports voice, data, and video
communications on and over the immediate battlefield. These forces include vehicles,
rotary and fixed wing, dismounted soldiers, sensors, and unmanned air vehicles (UAV).
F6
Version 1.0 8 July 2013
Functional Mission Command software applications such as Nett Warrior and the under
development Joint Battle Command Platform (JBC-P) end user application use SRW
enabled JTR sets over Internet Protocol (IP) capable networks and sub-networks. SRW
is interoperable with higher throughput, IP-based Mid Tier networking waveforms, such
as the future Wideband Networking Waveform (WNW), or ANW2 through network
gateways.
These IP-based networking waveforms enable information exchanges through the
Global Information Grid (GIG) and provide entirely new capabilities for battlefield
communications, situational awareness and information sharing.
The SRW Waveform Application (WFA) is essentially a Mobile Ad Hoc Networking
wireless router application, providing a RED-side (waveform) IPv4 network connection
across a known set of BLACK-side (Radio OE) RF network nodes.
The Soldier Radio Waveform supports both voice and data communications. Voice is
only supported in the Soldier System Domain (SS) while IP Unicast, IP Multicast and IP
Sub network Broadcast data is supported in all domains. Push-to-Talk (PTT) Combat
Network Radio (CNR) voice traffic is always sent using TDMA channel access. Voice is
transmitted as IP packets and is in all respects handled as data. No special processing
or handling is done for IP packets containing voice as the SRW is unaware that such
packets contain voice. Data is sent using either TDMA or CSMA/CA (Carrier Sense
Multiple Access with Collision Avoidance) channel access, depending on the desired
Quality of Service (QoS).
The following capabilities are common to all SRW domains: The system is self-forming
and self-healing; the system uses ad hoc routing protocols that require no fixed
infrastructure or reconfiguration when nodes are added, deleted, or moved; the system
provides Unicast, multicast and sub network broadcast capabilities; the system is
designed to support operation with small, lightweight, low power usage equipment; the
system interfaces to a Red IPv4 Inter-network Protocol Layer; the system provides both
COMSEC and TRANSEC functions.
All JTRs operating in the SRW network are considered a node or radio node consisting
of a JTR set or channel. These nodes operate as a component of the network. Each
can provide intra-network relay services for other nodes in the network.
Interoperability between mounted, unmanned systems, small combat units and
individual dismounted soldiers is provided through Internetwork Gateways, running
multiple waveforms, to support seamless communications across the entire battle
space.
4.1 Terms of Reference: SRW Operating Modes include: Combat Communications
(CC) - High data rate (narrow RF bandwidth); Electronic Warfare (EW) - Variable RF
bandwidth (narrow and wide), operating mode; Tele-Ops (TO) – High data rate (narrow
RF bandwidth).
4.2 SRW Domain: A SRW Domain is the summation of all SRW networks supporting a
specific operational function. SRW Domains: Soldier System (SS) Domain [Small, light
weight, battery powered, up to 40 km/h movement; voice and situational awareness
F7
Version 1.0 8 July 2013
(SA) capabilities]; Sensor (UGS) Domain [Small, 30+ day unattended operation, minimal
movement, sleep mode; Low data rates, sporadic transmissions]; Missile (NLOS-LS
LAM/PAM) Domain (In maintenance status only, no further WFA development) [SRW
1.1 Tele-Ops (In maintenance status only, further WFA development under
consideration)].
4.3 SRW Island: The fundamental unit of an SRW network structure is the island.
Islands are a contiguous group of SRW nodes which operate as a single routing entity.
All routing information is shared between all members of the island. Routing is
performed to support message delivery from entrance to exit via the intra-network layer.
In the SS Domain, an island is a connected graph of nodes organized in a mesh
structure.
4.4 SRW Tier: A Tier is all of the SRW nodes operating on a common TRANSEC and
common frequency set. A Tier is used to provide a multiple hierarchical level structure
to the islands. SS operates as a two tier network with 1A tier (islands) providing local
communication services and the 1B tier (island) providing interconnecting services to
the 1A tier or 1A Islands). There is only one 1B Island in a sub-network, whereas
multiple 1A islands can exist. In the SS Domain there are two tiers. Tier 1A consists of
multiple Islands and Tier 1B connects the Tier 1A Islands together. Tier 1A/1B
Gateways provide data crossover between Tier 1A and Tier 1B.
Figure F2 (Top Level SRW Network)
4.5 SRW Island Head: Every SRW Island has an Island Head. The Island Head is a
specific node in a SS island which is responsible for maintaining control over the island.
This control includes island membership and gateway service management. The Island
F8
Version 1.0 8 July 2013
Head generally appears first in the SRW network instantiation and the Island forms by
nodes attaching themselves either directly to the Island Head or to nodes already
affiliated with the island. The MAC address of the Island Head is also used as the Island
Identifier.
SRW Island Member: An Island Member is any radio affiliated with an SRW Island that
is not the Island Head.
SRW Gateway – A Gateway is a node that provides a crossover point allowing
communications between two otherwise incompatible entities. There are several
different types of gateways used by SRW as outlined below.
SRW Tier 1A/1B Gateway: An SRW radio in the Soldier System Domain with two
physical channels that operates on both Tier 1A and Tier 1B and provides a crossover
point for information to flow between Tier 1A and Tier 1B. This is always a radio
executing two SRW channels and is always also the Island Head of the Tier 1A Island.
There can only be one Tier 1A/1B Gateway per Tier 1A Island. This type of Gateway
may also be referred to as an Intra-domain Gateway.
SRW Inter-network Gateway: An Inter-Network Gateway Node is any radio node that
provides access to a foreign (i.e. not part of the island) network. This Gateway
designation does not include any attached local LANs and is a dual channel radio with
one channel operating in each of two different radio networks. The gateway may be
between SRW and ANW2 / WNW, in which case this is also referred to as a Backbone
Gateway, or two SRW networks. If the gateway is between two Soldier System (SS)
networks, it may also be referred to as an Intra-domain Gateway. There can only be one
active Inter-network Gateway per SRW network connecting to a higher level radio
network.
SRW Backbone Gateway: A Backbone Gateway is an Inter-network Gateway operating
between an SRW network and a higher layer network such as a WNW/ ANW2 network.
4.6 SRW Network: An SRW Network is a group of SRW nodes, operating in the same
domain, sharing a common unique TRANSEC, sharing a common IP Sub network
address on their RF interfaces and sharing a common set of frequencies. Each radio in
an SRW Network must have a unique MAC address. The IP Sub network Address plus
the MAC address equals the IP Host Address of the radio on its SRW RF interface. For
SRW, the IP Sub network Address is assigned out of the Red IP Address space.
SRW Sub network: The IP Sub-Network, as depicted in Figure F-3: Soldier System IP
Sub-Network, is a smaller grouping of network nodes, such as a Squad that
interoperate at a single communication layer. They are generally supported by an intranetwork layer, using a sub-network IP address to interconnect the network elements. A
LAN interconnects several hosts in an IP sub-network; where all hosts are configured
with a common IP sub-network address; so that they can communicate among each
other.
A RF Radio Network that supports IP can interconnect large numbers of radio devices
which share a single IP sub-network, but may have multiple links or intranet hops
between the nodes. Sub-networks can be separated by various parameters such as;
Frequencies, Mode- CC/EW, TRANSEC variable, by Physical isolation, or by Logical
Isolation.
F9
Version 1.0 8 July 2013
4.7 Combat Communications (CC) Mode: The Combat Communications mode is an
SRW modulation mode that uses both non-spread and Direct Sequence Spread
Spectrum waveforms operating in a 99% signal bandwidth of a 1.2 MHz channel.
CC mode is designed to operate over a carrier frequency range of 225 to 2500 MHz.
The SRW waveform provides for 2000-Kbps, 936.59-Kbps, 112.5-Kbps and 56.25-Kbps
data rates in a 1.2MHz bandwidth signal. A single modulation bandwidth of 1.2-MHz is
presently handled in the current version.
The Voice Service provides half duplex, point to multipoint broadcast, Combat Net
Radio (CNR) voice communications services for CC mode in the SS Domain.
Combat Network Radio Voice: A PTT (Push-to-Talk) point to multipoint voice service
that simulates the operation of a common user radio network such as SINCGARS but
provides range extension through a configurable number of RF relays. CNR Voice is
only supported in the SS Domain in a network operating in CC mode.
Electronic Warfare (EW) Mode: The Electronic Warfare mode is an SRW modulation
mode that uses a Direct Sequence Spread Spectrum waveform capable of operating in
99% signal bandwidths from 0.5 to 32 MHz. However, only 1.2 MHz bandwidth
channels are supported in EW mode. EW mode is designed to operate over a carrier
frequency range of 225 to 2500 MHz. EW mode provides more jamming protection and
better LPI/LPD characteristics than the CC mode.
4.8 RF Channel: The physical communications path between two SRW radios. All RF
Channels are 1.2 MHz wide and in the frequency range of 225 MHz to 2500 MHz.
Multiple RF Channels (frequencies) may be assigned to an SRW Network. When
multiple RF Channels are available they are assigned to different functions (reservation,
data, voice, LNE, etc.) via a logical (or functional) channel mechanism. Logical
Channels allow SRW to organize transmission tasks onto different assigned
frequencies. This allows multiple radios, within RF range of each other, to execute
multiple transmission tasks as long as there are different physical frequencies assigned
to the logical frequencies.
SRW RF Channels are selectable in 12.5-khz increments for carrier frequencies from
225-mhz to 2.5-ghz for all modes, as dictated by the radio hardware platform
performance characteristics. SRW supports multiple logical channel instances on a
single physical channel. For example: 1 for broadcast data, 3 for point to point voice, 1
for late net entry (LNE)
F10
Version 1.0 8 July 2013
Figure F3 (Soldier System IP Sub-Network)
5.0 Adaptive Networking Wideband Waveform (ANW2): Like SRW, ANW2 is an adhoc, self forming, and self-healing networking waveform. When nodes move in and out
of range, they are automatically added or removed from the network. ANW2 provides
an ITNE mid tier link between the TOC, ground and air vehicles, and dismounted units
with up to 30 radios in a subnet. It provides simultaneous IP data and voice with integral
situational awareness.
ANW2 allows units to use internet protocol routing to transmit medium to high
bandwidth data traffic over tactical Very High Frequency, Ultra High Frequency, and Lband radio networks. ANW2 is an industry proprietary waveform and is currently hosted
only on the AN/PRC 117G vehicle and man pack platforms. The AN/PRC 117G can
also host SRW and in the near term SINCGARS, HAVEQUICK and VULOS waveforms.
It is capable of simultaneously transmitting both Voice over Internet Protocol (VoIP) and
digital data on a single channel. Digital data include file transfers, chat, streaming video,
and position location reports.
The AN/PRC 117G is not a program of record and is scheduled to be replaced by the
Mid-tier Networking Vehicular Radio (MNVR) in the Capability Set 15 timeframe.
F11
Version 1.0 8 July 2013
Left Blank
F12
Version 1.0 8 July 2013
Appendix G
(Mission Command Mobile/Mounted Application Management)
1.0 Mission Command Mounted/Mobile Application Management: The Battalion S6 and their staff are responsible for ensuring that mission command applications that
operate on mounted platforms and mobile (dismounted soldiers) are properly planned,
configured, and initialized in support of the commander’s mission. This responsibility
requires the proper alignment of mounted/mobile applications with more fixed and
traditional applications residing on the Battle Command Common Services (BCCS)
stack of servers and other key information repository sources. Additionally, the battalion
S-6 must ensure the proper alignment and interoperability between the mission
command applications and the transport network of their battalion.
In the near term capability sets (CS 13/14), the battalion S-6 will spend most of their
time executing configuration tasks associated with the Joint Battle Command – Platform
(JBC-P) system and the Nett Warrior system. This primarily concerns the proper
configuration of the Tactical Services Gateway (TSG) with the overall JBC-P Network
Services Gateway for the proper flow of voice and data over the L-Band SATCOM
network provided by the JBC-P system. The Nett Warrior system requires the proper
configuration/scripting of radio transport data on the End User Device (EUD) to ensure
the Nett Warrior applications can properly communicate with their host radio and move
Nett Warrior data across the appropriate networks.
In the mid to long term, the functionality required to configure and initialize
mounted/mobile applications will be resident within the ITNE NMS. These capabilities
are planned to provide automated over the network configuration options that eliminate
the need to conduct manual procedures. The ITNE NMS can only configure
mobile/mounted applications that operate across the unit owned transport layer. This
will include the lower and mid tiers and a narrowband satellite communication
(SATCOM) link in the objective unit structure (circa CS 15/16 and beyond).
Commercially based transport networks such as Blue Force Tracking I and II and other
theater provided networks do not allow full NETOPS control by the Brigade Combat
Team (BCT) and the battalion S-6 staff. These networks will remain specialized to
certain configuration tasks performed provided by organizations that do have NETOPS
control. The configuration tasks are performed by the S-6 staff and must be considered
in the overall troop to task responsibility of the battalion S-6.
1.1 Mounted Applications: Mounted Applications are divided into three categories.
These include Native, Web Services and Virtual Machines. Native applications are built
onto the Mounted Computing Environment (MCE) software development kit (SDK) and
share common components, user interfaces, and communication methods (e.g. GPS,
JBC-P, etc.). Web Services are applications that are accessed via a web browser and
run as local web services with limited shared data such as Web Mail and Command
Post of Future (CPOF) thin client. Virtual Machines (VM) run as stand-alone VMs on
mounted platforms with minimal to no sharing such as CPOF thick client or DCGS.
G1
Version 1.0 8 July 2013
1.2 Mobile Applications: Mobile Applications are divided into two categories, those
that run natively on the mobile platform and those that are accessed as Web Services.
The Web Service is configured on a remote server that the mobile device subscribes to
with an IP address provided by the controlling authority. Native mobile applications on
the other hand must be configured by the battalion S-6 with a planning tool. With this
tool, the battalion S-6 can create, assemble, manage and transfer mission data. Mission
data includes digital map files, the Unit Task Organization (UTO), photo image files and
other files in support of the mission. Prior to putting the mobile device into operation the
battalion S-6 must ensure the map files are converted to a format accepted by the
mobile platform. Using the planning tool, the battalion S-6 must ensure all files imported
to the mobile platform are free of viruses or other destructive files. In the near term
(CS13/14), there is no method in place to manage user privilege levels or authenticating
users. These capabilities are planned for the mid to long term (CS 15 and beyond).
2.0 Mission Command Mounted Applications: Mission Command Mounted
Applications are applications that provide quick halt capability for Mission Command
Systems in support of Collaboration and the sharing of information. Mounted
Applications operate in a Mounted Computing Environment (MCE) that is comprised of
platforms, both in FIXED and MOUNTED configurations. Most of the Fixed applications
have extensions into Command Posts or Network Operations Centers. The Mounted
Applications are platforms that are further broken down into three categories: Native,
Web Services, and Virtual Machines. Native applications are built onto the MCE
software development kit (SDK) and share common components, user interfaces, and
communication methods such as JBC-P. Web Services are applications that are
accessed via a web browser and run as local web services with limited shared data
such as Web Mail and Command Post of Future (CPOF) thin client. Virtual Machines
(VM) run as stand-alone VMs on mounted platforms with minimal to no sharing such as
CPOF thick client or DCGS.
2.1 Joint Capabilities Release (JCR): JCR is an upgrade to Force XXI Battle
Command Brigade and Below (FBCB2) SA software that allows Soldiers in vehicles,
aircraft and command posts to track friendly forces and exchange messages in order to
synchronize operations and avoid fratricide. JCR provides the ability to take the initiative
on the battlefield and to achieve combat superiority over an enemy through increased
situational awareness and Battle Command. JCR utilizes the faster BFT2 satellite
network for improved accuracy of position location information. JCR offers improved and
additional security measures for BFT2, increased Army Battle Command System
(ABCS) interoperability and a simplified database. JCR provides more Soldier/user
friendly applications, windows look, new mapping tool, and many other additional
procedures and options. FBCB2-BFT has new hardware with the processor unit (JV5),
Platform Encryption Device (KGV-72 PED) for FBCB2-BFT, COMSEC loading device
Simple Key Loader (SKL), and a Secure MDL device.
JBC-P: JBC-P is the foundation for achieving information interoperability between Joint
warfighting elements on current and future battlefields. As the next generation of Force
XXI Battle Command Brigade and Below (FBCB2) technology, it will be the principal
G2
Version 1.0 8 July 2013
command and control system for the Army and Marine Corps at the brigade-and-below
level, providing users access to the tactical information necessary to achieve
information dominance over the enemy. It consists of computer hardware and software
integrated into tactical vehicles, aircraft, and provided to dismounted forces. JBC-P uses
a product line approach to software development to save costs and promote a common
architecture. Components include a core software module that provides common
functionality required of all platforms and tailored software modules with unique
capabilities for dismounted, vehicle, logistic, aviation, and command post elements.
JBC-P software is designed for use over the Blue Force Tracking II transceiver and
associated satellite networks, as well as ground-based networks. Other key
enhancements include a redesigned, intuitive user interface and faster mapping
software to quickly process and display critical graphics. The JBC-P screen also
integrates the functionality of Tactical Ground Reporting (TIGR), a multimedia reporting
system that allows lower-echelon soldiers to digitally capture, report, and retrieve patrol
data such as common incidents, residents and leaders of a village.
2.1.1 JBC-P Log: Combat Service Support (CSS) elements use Joint Capabilities
Release Logistics (JCR Log) Control Station (CS) to bring logistics into the digitized
battlefield with increased Situational Awareness (SA) and Command and Control (C2).
To plan and complete distribution missions, Common User Logistics Transport (CULT)
vehicles and other CSS assets use the SA and C2 capabilities that JCR Log CS
provides. JCR Log CS allows Transportation Movement Control and Operations
sections to exercise assured positive control of assets anywhere in the world. JCR Log
CS is critical to ensuring secure delivery of logistical support and to provide accurate SA
and C2 to the Common Operational Picture (COP) on the battlefield.
2.1.2 JBC-P CP OPS-Box: The JBC-P CP Ops-Box is a ruggedized laptop designed
for CP functionality. It provides the CP Operator with full communications, SA and
mission command capabilities in addition to Data Dissemination Services (DDS) and
Command and Control Registry (C2R) server connectivity.
The CP Server is a dedicated connection gateway to the Army Battle Command
Systems (ABCS) server, providing connectivity and DDS services, between Tactical
Services Gateway (TSG), Enhanced Position Location Reporting System (EPLRS)
SINCGARS, and BFT systems operating on the UTI and The ITNE.
The JBC-P CP System supports DDS server connection configuration and subscription
capability through a new DDS Manager Graphical User Interface (GUI) module which
allows for mission command messages and SA data to traverse between systems on
the network. When the system receives a subscribed DDS TARGET message that
indicates a mission has gone active, it generates the message and sends the data to
the ITNE in the form of SA or mission command.
The C2R Interface Configuration GUI on the JBC-P CP System provides the operator in
the Tactical Operations Center (TOC) with the capability to specify the interface
configuration parameters needed to establish a connection with the C2R server and
G3
Version 1.0 8 July 2013
dynamically coordinate and collaborate with Command and control naming addressing,
network and operations data. The C2R provides web service interface for retrieving and
updating address book data. It manages a repository of address book data required to
support unit addressing for e-mail and military messaging. Further, it monitors the
repository for updates and provides notification to BFA clients who need to update their
data cache. The C2R also collects Unit Task Organization (UTO) information from the
UTO PASS topic and updates repository with parent child relationships.
2.1.3 Tactical Internet Management System (TIMS): TIMS is covered under
Appendix I (ITNE Network Operations Management System).
2.1.4 Advanced Field Artillery Tactical Data System (AFATDS): AFATDS is an
automated Fire Support Command and Control (FSC2) system that processes,
analyzes, and exchanges combat information among the U.S. Army, U.S. Marine Corps
(USMC) and other Joint architectures. AFATDS provides fully automated support for
planning, coordinating, controlling and executing fires and effects. It supports weapon
systems such as mortars, field artillery cannons, naval surface fire support systems,
close air support, attack aviation, rockets and missiles.
AFATDS also acts as a fire support “server” to LAN-based and Tactical Internet-based
clients, including the AFATDS Effects Management Tool (EMT), and the USMC
Command and Control Personal Computer (C2PC) EMT. The clients provide real-time
situational awareness, battlefield geometry, and friendly/enemy unit location updates.
Local or remote clients used by U.S., Joint, and Coalition Forces may also access
AFATDS fire request capabilities to initiate engagement of time-sensitive targets.
AFATDS is capable of either direct or indirect interface with The Army Mission
Command Systems. This allows the Fire Support picture is included into the Common
Operating Picture. This interface allows systems such as DCGS-A to interact with the
Fire Support elements to provide accurate up to date information on the enemy.
2.1.5 Tactical Ground Reporting (TIGR): The TIGR system, is a web-based solution
that empowers users to collect, share and analyze data using a Google Earth like
interface backed by network distribution that is resilient to the challenges of the ITNE.
Found in both the Mounted CE and Mobile CE, TIGR provides information collection
and sharing to dismounted users in small units performing critical missions. It
complements systems being used at the operations center or higher headquarters by
sharing information seamlessly with other command and control, intelligence and
information systems used by higher commands.
TIGR makes it easier to aggregate information by providing company-level Soldiers the
ability to upload patrol debriefs and create reports on data collected from patrols, which
are then stored in a system that is searchable. TIGR allows Soldiers to tailor database
searches using a number of different parameters, and it offers search results that are
exportable to Microsoft Excel and PowerPoint.
G4
Version 1.0 8 July 2013
After completing a mission, Soldiers and convoy commander’s record in TIGR any
observations and events that occurred along their routes. TIGR also enables a convoy
commander to upload pertinent pictures or streaming video in addition to the text report.
For example, if a convoy commander notices a suspicious vehicle along the route and is
able to get a picture, description, and grid location for the vehicle, he can then upload
the data and media to TIGR for all to view.
Companies using TIGR can store data in a common database, which enables easier
analysis, collaboration, and information-sharing. Intelligence-derived data can then be
disseminated and retrieved by all echelons. The TIGR app is fully integrated into the
JBC-P family of devices to include handhelds and JBC-P mounted platforms. It is
important to note that the handheld devices require reach back communications,
provided by a JTRS radio running the SRW, with higher headquarters to access the
TIGR database. The mounted platforms will transfer information to and from the TIGR
database using the Blue Force Tracking 2 (BFT2) satellite network for much faster
communications between Soldiers.
2.1.6 Network Services Gateway (NSG): The NSG is covered under Appendix I
(ITNE Network Operations Management System).
2.1.7 BFT Global Network (BGN): The BGN provides the link between JBC-P Hand
Held, JBC-P/JCR Mounted platforms and TOC systems at the Company, Battalion and
Brigade level as well as Secret and Unclassified domains.
3.0 Mission Command Mobile Applications: Mission Command Mobile Applications
also provide capability for Mission Command Systems but reside on much smaller
portable devices. Mission Command Mobile Applications bring C2 and SA to the
tactical edge using applications that use similar code to the mounted application but are
condensed to operate on mobile devices much like smart phones and tablets in use
today. The following is a list of commonly found Mission Command Mobile Applications
used within the ITNE for the purpose of disseminating SA and C2.
3.1 Nett Warrior: Nett Warrior is a dismounted hand-held system designed to provide
PLI down to the Team Leader dismounted Soldier levels. Nett Warrior is designed to be
paired up with various terrestrial radio appliqués (i.e., PRC 154 Rifleman Radio, 117G
Harris, HMS PRC 155, 152A Harris, Sidewinder, Sidehat or other JTRS radios). The
Nett Warrior operates independently from Platforms and is able to leverage terrestrial
communications. NW is used in conjunction with the JBC-P Platform configured as a
NSG, and PLI is entered into the network by the NSG.
3.2 Joint Platform Tablet (JPT): JPT is a role based, ruggedized portable tablet, and
host the JBC-P software, loaded on the JPT. JPT incorporates an embedded Satellite
Transceiver and contains the JBC-P software. The purpose of JPT is to occupy less
space in a vehicle installation and to reduce SWaP.
G5
Version 1.0 8 July 2013
3.3 Forward Observer System (FOS): Found on both Mounted and Hand Held
systems, FOS software enables forward observers and fire support teams to plan,
control and execute fire support operations at maneuver platoon, company, battalion
and brigade levels.
4.0 Near Term (CS 13/14) Planning and Initialization of ITNE Mounted/Mobile
Mission Command Applications: The following information is provided as a guide to
the technical procedures provisioned by the JBC-P program.
4.1 Initialization Process: Throughout the ITNE Planning Process there are several
steps that must be performed by the battalion S-6 to ensure all Mobile/Mounted Mission
Command Applications are properly configured to facilitate the flow of C2 and SA along
the several data paths within the ITNE. Figure 1.0 and Figure 1.1 will act as a guide to
aid the battalion S-6 in properly configuring the Mobile/Mounted Mission Command
Applications within the ITNE prior to initialization.
Figure G1 (Mission Command Application Initialization Process)
G6
Version 1.0 8 July 2013
4.1 Software Load on Removable Hard Disk Drive Cartridge (RHDDC): During the
planning process the battalion S-6 coordinates with the brigade S-6 to receive the latest
“Master Golden Brick” (MGB). The MGB will contain the latest software, current UTO,
and map data as requested by the current mission. With this data, the battalion S-6 will
coordinate with subordinate units to perform Disk Duplication; this applies to units using
FBCB2 version 6.5. Units using JCR and beyond, will receive this data load via Secure
MDL and distribute to each JBC-P platform using the Secure MDL.
4.2 Administrative Functions for JBC-P Ops-Box: The JBC-P CP OPS Box will be
located in the TOC and it gives the battalion S-6 the capability to manage and monitor
his or her network. The CP Ops-Box has server connectivity to the Command and
Control Registry (C2R).
4.3 Data Dissemination Service (DDS) Subscription: The battalion S-6 creates the
connection to the DDS using the DDS Manager Graphical User Interface (GUI) module
which allows for mission command messages and SA data to traverse between
systems on the network. When the system receives a subscribed DDS TARGET
message that indicates a mission has gone active, it generates the message and sends
the data to the ITNE in the form of SA or mission command.
4.4 Command and Control Repository (C2R): The C2R provides web service
interface for retrieving and updating address book data. It manages a repository of
address book data required to support unit addressing for e-mail and military
messaging. Further, it monitors the repository for updates and provides notification to
BFA clients who need to update their data cache. The C2R also collects Unit Task
Organization (UTO) information from the UTO PASS topic and updates repository with
parent child relationships. The C2R Interface Configuration GUI on the JBC-P CP
System provides the S-6 with the capability to specify the interface configuration
parameters needed to establish a connection with the C2R server and dynamically
coordinate and collaborate with command and control naming addressing, network and
operations data. The battalion S-6 will subscribe to the appropriate UTO on the DDS to
ensure the relevant UTO is used at all times. Once subscribed to the UTO Mission
Data Set (MDS), the battalion S-6 can export the UTO to a secure Mission Data Loader
(MDL) to upload it manually to systems that may not have had the RHDDC duplicated
from the MGB.
4.5 Create address book for Aviation Military Planning System (AMPS) data set:
Using the UTO and C2R, the battalion S-6 will create an AMPS data set.
4.6 Verify Universal Chat Bridge (UCB) connectivity: The Chat feature provides the
capability to communicate with all other TOC Army Battle Command Systems (ABCS).
All necessary network values are provided on a network cut sheet from the brigade S-6.
These values are configured through the UCB Configuration dialog box by adding the
assigned IP address with the appropriate URN.
G7
Version 1.0 8 July 2013
4.7 Employ Log Manager: The Log function is used to record and compile logs for
reports to be sent to higher headquarters such as the Brigade Security Officer. The Log
Manager is accessed through the Hemisphere menu and selecting tools then Admin
followed by Log Manager. In the Log Manager, the S-6 has the ability to select which
Logs he or she would like to employ. The S-6 can refer back to the Log Manager to
export reports by date and time.
4.8 Initiate SA Monitoring: SA monitoring function provides the ability to monitor the
health/status of the ITNE nodes that emit PLI. The Monitoring interval is based on unit
SOP and can be changed based on mission requirements. The interval times for the
SA Monitoring Tool can be changed by selecting Apps>SA Monitor. Monitoring
intervals are assigned a color to illustrate the platforms health. These include: Green:
Active; Olive Green: Marginal; Purple: Aging; Red: Old.
4.9 Establish Certificate Management: From the TOC the battalion S-6 can remotely
challenge systems that may have been compromised to ensure security is maintained.
This is performed through the use of Public Key Infrastructure (PKI) keys. PKI keys are
supplied by the PM FBCB2 office but they are provided on the software updates
provided by the PM to the brigade S-6 office. If new keys are needed, the battalion S-6
would request the keys be installed from a CD or by Secure MDL using the Mission
Data Loader App within the Hemisphere and are requested. The S-6 or SO may
challenge a remote user to re-authenticate, or disable a remote user. Prior to sending a
re-authentication message, the S-6/SO must install the Private and Public keys. The
Private PKI key must be installed on the Security Officer system, and the Public PKI key
must be on the JBC-P system being challenged and the PKI keys must match. Should
the digital signature fail, the S-6/SO will receive a “Message Authentication Failure”
message. A reply to a re-authentication request must be sent within 10 minutes.
Failure to comply will not disable JBC-P; however, the S-6/SO may request a reauthentication with lockout to lock the receiver out of the FBCB2-BFT network
4.10 Manage unit and individual passwords: Passwords are managed using the
JBC-P CP OPS box using the security application within the Hemisphere menu.
Passwords may be generated using this application or can be loaded via Secure MDL
device. It is important to note that passwords installed from a Secure MDL device are
automatically activated. The battalion S-6 is responsible for managing and maintaining
the passwords to include creating and importing passwords. Generated passwords
allow the S-6 to input data for a group of users to enable access to JBC-P. This
procedure can be used to generate a single password or multiple passwords. It is
important that members no longer requiring passwords be purged from the password
table. Passwords can be exported to a Secure MDL device and stored in accordance
with AR 25-2 and local security SOPs.
4.11 Security log/messages functions: JBC-P CP OPS box has a Security
Log/Messages Function that enables viewing and modifying security logs. This service
must be managed by the S-6 or Security Officer (SO) to print, delete, export or refresh
security logs. The S-6 generates reports that can identify any attempts to break into the
G8
Version 1.0 8 July 2013
system.
The battalion S-6 will use the JBC-P CP OPS box to import the TSG initial data load
from the C2R. Once this data load has been imported the battalion S-6 will export the
TSG initial data load to the TSG using a Secure MDL or File Transfer Protocol (FTP).
The other option is to use Self Descriptive Situational Awareness (SDSA) which can
take upwards of 4 hours.
4.12 Once the TSG receives the initial data load it must then be configured to effectively
route data and communicate with other services within the ITNE. Listed below in figure
G2
are
the
steps
needed
to
configure
the
TSG
for
operation.
Figure G2 (Steps to Configure TSG)
5.0 Battalion S-6 role in establishing the EPLRS network: The EPLRS Network
Manager (ENM) is a laptop that configures and maintains the EPLRS Network. The
ENM connects directly to an EPLRS radio to provide master timing and initialization of
an EPLRS network. Additionally, the ENM can be simultaneously connected to a
Crypto Key Generator for OTAR and key generation. The ENM provides master timing
and control of an EPLRS network of up to 400 plus radios. ENM can be used in a
purely network monitor mode in which there is no direct control of the network but the
G9
Version 1.0 8 July 2013
status can be constantly monitored. The battalion S-6 receives the data needed to
establish the EPLRS network in the form of a prebuilt data product.
5.1 Battalion S-6 role in JBC-P Handheld initialization: The Nett Warrior System
provides an integrated, situational awareness system to dismounted leaders for use
during combat operations. It facilitates faster & more accurate decisions during the
tactical fight, and connects the dismounted Soldier to the Network. This translates into
Soldiers being at the right place, at the right time, with the right equipment, making them
more effective, more lethal, and better prepared to execute their combat missions. The
Nett Warrior System is a transport-agile, handheld end user device that supports Army
BCT Modernization. The battalion S-6 is responsible for coordinating with the battalion
S-2/S-3 to obtain the correct maps to be installed onto the Nett Warrior End-user Device
(NW EUD). The battalion S-2/S-3 will coordinate with the brigade Topographic (Topo)
Team to receive the map files required for this endeavor. Units with a Nett Warrior
Mission Planner (NMP) should ensure that its external hard drive has an archive of map
files that provide map coverage of the unit’s entire Area of Operation (AO); this is so
that the unit can later access this Map Source to generate location-specific maps for
installation onto NW EUDs.
The battalion S-6 will determine what types of maps to install onto the Nett Warrior EUD
and ensure the Brigade Topo Team understands what files the NW operator needs to
have. As a basic guideline, maps coverage should include large and small scale maps.
1:250,000, 1:100,000, 1:50,000 scale maps have contour lines and location names, so
the battalion S-6 will likely want to ensure the Topo Team provides some or all of these
types of maps. Imagery can provide terrific, up-to-date satellite photos of objective
areas, so CIB and sub-meter imagery should be requested from the Topo Team as well.
Compatible file types are listed below:
5.1.1 GeoTIFF: GeoTIFF is a non-proprietary geographic TIFF format and has a .tif or
.tiff file extension. A single GeoTIFF file provides map coverage for one geographical
area, and it contains several tiers or levels of tiles (i.e., zoom levels) at different spatial
resolutions covering the entire tileset. GeoTIFF stores georeference information in a
TIFF compliant raster file by tying a raster image to a known ‘Map Projection.’ The
GeoTIFF format uses a defined set of TIFF tags to describe cartographic (mapping)
information that originates from satellite imaging systems, scanned maps, scanned
aerial photography, digital elevation models, or as a result of geographic analyses.
Supported projections include UTM and National Grids, as well as the underlying
projection types such as Transverse Mercator.
5.1.2 ITF RPF: The NITF RPF imagery format actually consists of a collection of various
files in a structured directory tree. The .TOC (Table of Contents) file is found at the root
of the tree and simply describes what each other file is, and is considered by the NMP
as the ‘file’ for that format (e.g., when the user is selecting a file for import, they will
chose the ‘a.toc’ file instead of any of the others). NITF RPF format imagery provides
map coverage for one geographical area, and it contains several tiers or levels of tiles
(i.e., zoom levels) at different spatial resolutions covering the entire tile set. RPF can be
G10
Version 1.0 8 July 2013
categorized into two further types: CADRG (Compressed Arc Digitized Raster Graphics)
and CIB (Controlled Image Base) rasters.
5.1.3 MrSID: The MrSID (pronounced Mister Sid) imagery format has a .sid file
extension. It is a patented, wavelet-based file format designed to enable portability of
massive bit-mapped (raster) images. The MrSID technology enables instant viewing
and manipulation of imagery both locally and over networks without sacrificing image
quality. Since MrSID is widely used for geospatial images, it incorporates metadata to
support georeferencing, as is needed on the Nett Warrior Mission Planner.
5.1.4 MDP: An MDP map file is created by the Mission Planner when generating a map
and it is the type of map file that is loaded onto Nett Warrior EUDs. An MDP map file
can also be created on the Advanced Mission Data Support Equipment (AMDSE),
which is a computer system similar to the Mission Planner and which is still in circulation
today at some units, such as the Ranger units. The MDP map file is in the file format
needed to be installed on NW EUDs however, the file is not in the required .jpeg file
format required by the NMP to display maps on its screen.
5.1.5 JPEG (Joint Photographic Experts Group): JPEGs are already in the file
structure needed by the NMP to display maps on the screen, and which is described in
the below paragraphs. GeoTIFF, NITF RPF, MrSID, and MDP files, however, cannot
display on the NMP screen until they are imported.
G11
Version 1.0 8 July 2013
Left Blank
G12
Version 1.0 8 July 2013
Appendix H
(Ancillary Devices)
1.0 Ancillary Devices: The Ancillary Devices component of the ITNE covers all
networked and non-networked items that connect directly to the radio platform or
provide assistance in the routing and transmission of data between radios or security
environments within the lower and mid-tier of the ITNE. These devices can range from
talk selector switches (TSS) that connect to the radio platform and provide ease of use
across talk groups to tier III routers, cross domain solutions, and gateways for Joint and
multinational interoperability or enterprise services such as PNT provided by the Global
Positioning System (GPS).
It is important to understand that the Ancillary Devices component of the ITNE is one of
the fastest changing areas within the ITNE. New, improved, and modified devices are
constantly added and removed from this component and must be actively tracked and
understood within each capability set to ensure proper planning and management
between these devices and other components of the ITNE. GPS tactical receivers are
one of the most widely used ancillary devices across all formations. GPS tactical
receivers are integrated stand-alone or embedded ancillary devices that provide access
to PNT enterprise service. In the near future, the number and types of GPS receivers
will be reduced through a distributed approach at the platform (mounted or dismounted)
level. Examples and definitions of current Ancillary Devices are listed in Appendix H of
this CONOPS.
2.0 Networked Ancillary Devices: Networked Ancillary Devices provide critical
interconnectivity capability between radio networks and ensure voice and data are
processed and routed according to the quality of service and prioritization established
by the commander. In the near term, these devices are managed on an individual basis
through commercial off the shelf configuration tools. In the mid to long term, the
network management tools associated with these devices will migrate to the NMS and
be fully integrated as part of the planning and management feature of the system.
2.1 Tactical Routers: Any Tier II or Tier III device that facilitates the routing of voice
and data traffic across the ITNE and operates as an organic asset to the ITNE (Battalion
Network). Each SDR has a tactical router built in as part of the radio capable of IP
routing needs of the radio. There are times when you have to bridge different tactical
networks working on different radios or waveforms. The router routes the IP packets
between the different radios connect to it. The routers can be configured as a border
gateway between different networks (i.e. ITNE & WIN-T). As a border gateway the
router the router is recognized by the other routers in the network as a access point to
additional networks. Border Gateway Protocol (BGP) manages the interface.
2.1.1 DRS Tactical Router provides the border gateway between SRW, ANW2, and
WNN. Enables radio cross-banding for voice interoperability between different radios.
The router can be mounted with the intercom system (VIC3).
H1
Version 1.0 8 July 2013
DRS Tactical Router
Figure H1 (DRS Tactical Router)
H2
Version 1.0 8 July 2013
2.1.2 DTECH Tactical Router: Man-packable and vehicular mounted CISCO based
router. The router TR interfaces with SRW, WNW, ANW2, or any other IP based
transmission system (i.e. BLOS, VSAT) and supports ABCS (TIGR, CPOF, etc) via local
virtualization. DTECH Router provides network routing and switching to support multitier voice, video and data. It uses a common CISCO manager control interface.
Supports bridging of 4-8 networks with local and remote user access capability.
Figure H2 (TXC4 Tactical Router)
Figure H3 (TXC3 Tactical Router)
H3
Version 1.0 8 July 2013
2.1.3 Agile Tactical Router: fully compliant based IP router. It supports Ethernet (up to
GigE), USB, and RS-232C serial I/Fs on each of the 4 ports. The router is managed via
SNAP and an intuitive CLI /Web GUI. Flexible Linux based software architecture that
enables the addition of new network protocols and transport/application extensions.
The router interconnects multiple radio nets and local host /LAN devices. UNICAST
routs IP traffic based on radio routing exchanges (RIP/OSPF) and desired routing
rules/filters. Multicast routes traffic based on user group subscriptions and multicast
filtering/scoping requirement.
Agile Tactical R outer
Figure H4 (Agile Tactical Router)
H4
Version 1.0 8 July 2013
2.1.4 Klas Tactical Router: The Cisco 5915 ESR meets the critical need for ondemand network connectivity for network applications solutions require versatile
network platforms that deliver; high performance in a small form factor; transparent
access of mission critical voice, video, or data; infrastructure-less networking that
reaches beyond the range of a fixed networks; self-forming temporary ability;
sophisticated networking capabilities such as QoS to ensure the most important data
gets through when links are degraded; security to protect data and the network; 3 port
switch and 2 fast Ethernet ports to provide a total of 8 Ethernet ports, removable
storage, plus support for legacy interfaces such as ISDN WAN, FXs and PPP; and
3G/4G cellular data and 802.1b/g/n WAN transport expansion
Klas Tactical Router
Figure H5 (Klas Tactical Router)
H5
Version 1.0 8 July 2013
2.1.5 GDC4S Tactical Router: Cisco 5900 series is a router and firewall with intrusion
detection system (IDS) embedded. The router provides a gateway between the ANW2
and SRW networks. Router includes PPPoE (to support flow control for ground to
ground and ground to air communication), R2CP (Radio Router Control Protocol) for IP
Radio communications. Help ensures policy consistency for highly mobile, densely
populated virtual machines. Integrated threat control using Cisco IOS Firewall, Cisco
IOS Zone-Base Firewall, Cisco IOS Intrusion Prevention System (IPS), and CISCO
Content Filtering
GDC4S Tactical Router
Figure H6 (GDC4S Tactical Router)
2.2 Cross Domain Solutions (CDS):
2.2.1 Advatech Cross Domain Solution: Enables seamless tactical data
communications (messages, video, and audio) between two different security domains
while maintaining network security for each. Advatech CDS is rule based automatic
message content filtering, full bi-directional guard, remote management capability, anttemper/device zeroization built in, IEEE-802.11b/g wireless access point, MIL-STD461FEMI /EMC compliant, multiple IO options 10/100BT Ethernet, RS-232 / 422, USB
2.0, programmable with windows based GUI toolset.
H6
Version 1.0 8 July 2013
Figure H7 (Advatech Cross Domain Solution)
2.2.2 Sentinel Cross Domain Solution: provides a small form factor, embeddable
solution for connecting tactical platform centric systems to information sharing networks
to allow communications across security enclaves for tactical data communications
(messages, video, and audio) maintaining network security. Utilizes certified deep
packet inspection technology pioneered by the SILENTWIRE technology that is
incorporated in the security rules processing engines.
Sentinel Cross Domain
Solution
Figure H8 (Sentinel Cross Domain Solution)
H7
Version 1.0 8 July 2013
3.0 Non-networked Ancillary Devices: Non-networked Ancillary Devices provide key
capability enhancements to a particular component or in some cases critical
functionality for all ITNE components. The previously mentioned TSS is a good
example of a key enhancement to a particular ITNE component. In this case, using the
TSS enables a radio operator to easily switch between talk groups with the click of a
dial. Without the TSS, the radio operator is forced to directly access their radio and is
limited to the interface on the actual radio platform. The Data Transfer Device (DTD) is
an excellent example of an ancillary device that performs the critical function of
transferring the entire network set of planning data from the network plan in the NMS to
the actual radio platforms. Without the DTD, the S-6 staff would have to use the NMS
itself which would take considerably more time and effort due to the limited number and
locations of the NMS.
3.1 Data Load Devices:
3.1.1 Simple Key Loader (SKL): the AN/PYQ-10 is a portable hand-held fill device for
securely receiving, storing, and transferring data between compatible cryptographic and
communication equipment. Provides streamline management of COMSEC key,
Electronic Protection (EP) data, and Signal Operating Instructions (SOI). The SKL
operated on a Window based 32 bit Intel processer, and 400 MHz CPU. The SKL uses
98MB flash ROM working memory and 64 MB SDRAM storage capability. Uses a 3.5
65K color QVGA display with a optional VGA CRT output.
Simple Key Loader (SKL)
Figure H9 (Simple Key Loader) (SKL)
3.2 Radio Accessories: Updated in later version
H8
Version 1.0 8 July 2013
Appendix I
(ITNE Network Operations Management System)
1.0 Network Operations (NetOps) Management System (NMS): The NMS
component of the ITNE is the integrated capability that allows network managers to
plan, configure, manage and monitor all other components of the ITNE. This includes
radio platforms, mission command mobile/mounted applications, ancillary devices, and
waveform applications. The NMS is the capability through which the Battalion S-6 staff
develops and builds a network plan and initializes and operates the radio network for
their respective command level.
The NMS is a distributed capability. NETOPS is achieved through the functional
integration of NETOPS capabilities across the radio platform OE, the waveform
application software, and the NMS. This ensures that NETOPS functionality is baked
into the ITNE across all components. Near term capability sets will not have the baked
in NMS capability. Battalion S-6 staff will need to conduct a number of tasks manually
to ensure the network is properly planned, configured, and loaded into ITNE component
devices. Mid and long term NMS capabilities will enable the Battalion S-6 to conduct
much of this work from the NMS interface with the assurance the functionality spans all
components at all levels of network interoperability.
In the near term, the ITNE NMS is primarily a planning tool and a reduced capability
management tool (limited monitoring). The details of these capabilities are included in
Appendix I under the description of the Joint Tactical Network Environment NETOPS
Toolkit (J-TNT). The J-TNT is the near term capability for the ITNE NMS. Systems with
greater automated and over the network capability are planned for the mid to long term
capability sets.
2.0 Near Term ITNE NetOps Systems: In the near term (CS 13/14), the ITNE NMS is
composed of more than one integrated system. These systems include the Joint
Tactical Networking Environment NetOps Toolkit (J-TNT), the Tactical Internet
Management System (TIMS) and Network Services Gateway (NSG) which are both part
of the Joint Battle Command – Platform (JBC-P) system.
2.1 Joint Tactical Networking Environment NetOps Toolkit (J-TNT): The J-TNT is
the NetOps Management System for the ITNE. The J-TNT is the most critical
subcomponent of the ITNE, which enables the S-6 staff to plan, manage, and analyze
the radio networks for each respective command level. A graphical user interfaces
(GUI) is provided to the application user to perform tasks such as: creating plans,
importing third-party data, generating radio configuration files, and generating reports.
The J-TNT is a NetOps Tool that combines three separate systems into one. There are
three core software applications that make up the J-TNT; Joint Automated
Communications Electronics Operating Instruction System/Automated Communications
Engineering Software (JACS/ACES), Joint Tactical Radio System Enterprise Network
I1
Version 1.0 8 July 2013
Manager (JENM), and Joint Capability Release – Radio Based Situation Awareness
Monitoring (RBSAM) software using VMWare to create a single tactical network
management tool.
1.0 J-TNT (JACS/ACES): J-TNT (JACS/ACES) provides pre-deployment and post
mission planning enabling the S-6 staff to do legacy radio network planning to insure
interoperability of RF networks, cryptographic network planning, and ANW2 (Harris)
radio network planning. Electronic Protection (EP) data & radio network engineering for
secure communications is also part of the pre and post mission planning. The following
are all generated by the J-TNT; Joint Communications Engineering Operations
Instruction (JCEOI), Communications Engineering Operations Instructions (CEOI),
cryptographic key tag and TRANSEC Key generation. ACES also provides the
capability to support Black Key packaging & distribution, provides fills for the legacy
DTD AN/CYZ-10 and Simple Key Loader AN/PYQ-10 (C) with secure net information
directly or Over-the-Network. The following radio types are supported by the J-TNT
(JACS/ACES): Harris Radios: Falcon III (AN/PRC-117G) and Falcon III (AN/PRC-152A)
ANW2 Only and All Legacy (SINCGARS, AN/PSC-5, AN/PRC-150, etc.) Radio Sets in
the Army inventory currently used in CS13
Figure I1 (J-TNT (JACS/ACES) Planner)
3.0 J-TNT (JENM): The system provides pre-deployment and post
deployment network management services to the SOFTWARE DEFINED RADIOS
(SDR) radios. J-TNT (JENM) provides pre-deployment planning for the radio and SRW
waveform parameters and creates radio configuration files. These files are further
processed to create the exact file structure for the radio type to be loaded to a radio,
Simple Key Loader (SKL), CD/DVD, or Universal Serial Bus (USB) drive. J-TNT (JENM)
provides post deployment support in monitoring and controlling the deployed networks
I2
Version 1.0 8 July 2013
and radios. The following radio types are supported by the J-TNT (JENM): HMS Radios:
AN/PRC-155 (Manpack), AN/PRC-154 (Rifleman) and AN/PRC-154A (C-Rilfeman).
ITT Common Core Radios: Sidehat and Soldiers Rifleman Radio, and Harris Radios:
Falcon III (AN/PRC-117G) and Falcon III (AN/PRC-152A).
2.2 Tactical Internet Management System (TIMS): Tactical Internet Management
System (TIMS)-ON-Joint Capabilities Release (JCR) Radio Based Situational
Awareness Monitor (RBSAM): The RBSAM capabilities allow the S-6 Section to
maintain live, near-real-time situational awareness of Lower and Mid-Tier Situational
Awareness (SA) currency by alerting operators and leaders to SA currency degradation
with a finer level of detail than the JCR alone is capable of. By implementing RBSAM,
the S-6/Commo team has not only a better viewpoint of SA currency, but by using
Position Location Indicator (PLI) reports received from radios and hand-held devices,
the RBSAM system is able to validate PLI reporting and thus infer radio up/down status
across multiple nets. The RBSAM integrates diverse technologies by using COTS
computers in a tactical environment using 2525B compliant icons for identification of
Common Operational Picture elements. RBSAM provides end-to-end SA currency of all
PLI reporting systems which use K5.01 JVMF messages to push their location on the
battlespace. The examination of this currency may be done by group/unit or by platform.
SA filtering is based on currency classification or radio types. Additionally, statistical
reporting may be done on-demand or over time intervals pre-defined by the user.
2.3 Network Services Gateway (NSG): Network Services Gateway (NSG): Is a JBC-P
system that has full or partial Network Services Gateway (NSG) capabilities enabled on
it that bridges two or more networks (WIN-T and ITNE). Gateways can be placed within
vehicles, Command Post Servers and J-TNT (JBC-P OPS Box configurations).
Gateway capabilities differ by gateway type & available resources. The capabilities are
grouped into three service groups. Gateway Services include the transmission of
Gateway Solicitation Message (GSM), SA Forwarding Self Descriptive Situational
Awareness (SDSA) Forwarding, C2 Forwarding, Chat Forwarding and SA Spawning.
Network Services define supported communications networks that NSGs can bridge.
These networks include WIN-T, BFT 1, BFT 2, Terrestrial Radio Networks and
SIPRNet. Services- Over-the-Network provides data exchange between JBC-P and
external systems. These Services include Anycast C2 Forwarding, Address Book
(Army C2I & USMC Address Book), Distributed Data Service DDS, Universal
Collaboration Bridge (UCB) and USMC Tactical Service-Oriented Architecture (TSOA)
in future builds.
The Gateways are categorized into two tiers. Tier 1 Gateways include the BFT Global
NOC (BGN) and J-TNT (JBC-P Ops Box). These Gateways have Message Routing
Tables (MRTs) that contain the Client URN, Servicing Gateway URN and the IP of the
Servicing Gateway. Tier 2 Gateways is located in vehicular platforms contain MRTs
however, will only contain the Vehicle Client URNs & rely on the BFT Global NOC
(BGN) or a CP to route C2 messages to clients of other Gateways.
I3
Version 1.0 8 July 2013
3.0 J-TNT (JENM) Planning: The J-TNT (JENM) provides pre-deployment services for
defining radio configuration plans. Many of the required activities are abstracted from a
single data entry used to create network definition over many elements. The application
user is guided through the required and optional configuration steps to create planning
information. The planner provides visual cues to the user throughout the planning
process concerning next steps and incomplete or data entry errors. The following
capabilities are provided by the Planner to enable the user to define a SOFTWARE
DEFINED RADIOS (SDR) Mission:
Data entry – manual entry of data into the forms
Wizard/ Expert Navigation – The Wizard mode allows the user to do high level planning
to quickly develop a network plan. The Expert mode is used by the user to edit the
detailed network information created using the Wizard mode
Import data – import data from an existing plan and global data such as frequencies and
voice call books
Export data – export global data or a plan for reuse in another plan
3.1 Planning Flow: Figure I2 is a typical J-TNT (JENM) Planner workflow. The process
starts by launching the Planner. When the GUI appears, the network planner may start
a new plan or may continue working on a previous plan. If choosing a new plan, new
data set and preset template data must be entered in the required areas of each form.
If a previous plan is opened, depending on the plan status, data set and/or preset
template data may need to be modified before generating configuration files.
I4
Version 1.0 8 July 2013
Figure I2 (J-TNT (JENM) Planner Workflow)
The Wizard mode (guided help) provides a step-by-step process by sequentially
advancing the necessary forms associated with each tree planning element. This
process may also be customized using the navigation wizard. After the required areas
of the form have been entered, that form is validated and the next one advanced by
selecting the “Next” button on the navigation bar or by selecting the “Add” button to
create another item. Data from another Plan or the Global List may be imported from
the database (DB) at any time.
After entering the required information for data sets and preset templates, associations
must be made before being able to export the configuration files. The required
association, via the drag-and-drop action, is between the preset templates to the radio
inventory items. Once valid association and network data is generated, the network
planner is allowed to further customize the advanced preset settings under the Network
branch. When the Plan definition is complete and all required information is entered, the
plan can be exported into the Mission Configuration files. Reports may be generated at
any point while creating a plan. Figure I3 ( is a representative J-TNT (JENM) Planning
screen layout.
I5
Version 1.0 8 July 2013
Figure I3 (J-TNT (JENM) Planning Screen Layout)
3.2 Planning Data: The GUI provides a visual output of the Plan in form of a tree with
its planning elements. The planning elements within a tree are linked to entry forms that
allow the application user to define information necessary to complete a Plan. The tree
area of the GUI consists of two tabs, the Plan tab and the Global List tab.
3.2.1 Plan Tab: The Plan tab contains all required elements to create a Plan, and is
organized into three main planning elements, which are:
Data Sets – A data set allows a network planner to define high level JTR settings that
can be referenced or associated onto other planning elements in a Plan
Templates – A template allows a network planner to define and organize a generic
layout of platform and waveform presets. The templates may be associated to a single
or multiple radio inventory items in a Plan
Networks – A network allows a network planner to further customize a radio’s preset
condition which is seen as a Node in a radio network. Edits made under this element
do not affect the information contained in the templates or data sets in a Plan.
Globals - List is a superset of information available to import into any Plan by the
network planner and is comprised of all of the data sets planning elements except Radio
User Groups. The network planner has the capability to import data sets from the
Globals List into a Plan to save time in applying the same information across multiple
Plans. Third-party (e.g. ACES and LMD/KP) generated XML files containing DS-100-1
key tags, SOFTWARE DEFINED RADIOS (SDR) key tags, and Black Keys for crypto
(security) planning can be imported into the Global List. J-TNT (JENM) provides the
I6
Version 1.0 8 July 2013
network planner the capability to automatically generate data sets based on the
information in those third-party files.
3.2.1.1 Data Sets: Data sets capture the JTR settings and are outlined into the
following types:
Radio Inventory – Radio Inventory are physical radio items and their high-level settings
that apply under any given preset condition in a mission. The settings consist of a radio
type, radio serial number, radio role, and radio hardware configuration setup.
Frequencies – Frequencies assist RF spectrum planning and define a list of physical
frequencies which are applicable for a set of radio types for more than one preset
condition in a mission.
Frequency Filters – Frequency Filters assist band exclusion planning and define a list of
physical frequency bands that must be excluded from use by a set of radio items
Cryptos – Cryptos assist security planning for transmission channels (TRANSEC and
COMSEC) and define a list of SOFTWARE DEFINED RADIOS (SDR) and DS-100-1
key tags for use by a waveform under a RF Network setup
RF Networks – RF Networks are sub-network definitions applicable to the Soldier Radio
Waveform (SRW). RF Network definitions capture the underlying characteristics of a
radio network and consist of a set of radios operating in the same preset condition in a
mission. This requires a definition of the following characteristics: RF IP network layer,
RF spectrum allocation, crypto key allocation, and SRW networking domain and
communications mode.
Radio User Groups – Radio User Group definitions are applicable for radio types that
support the capability of role management based on defined user groups.
Management Interface – Management Interface definitions are applicable for radio
types that support the interface with management applications through standard
protocols (e.g. SNMP).
Voice Call Books – Voice Call Books allow voice call planning for the Combat Net Radio
(CNR) voice feature of the SRW SS domain and define a list of call groups applicable
for more than one preset condition in a mission.
The data sets can be imported from the master list of information, maintained under the
Globals List, with the use of the Import to Plan function.
I7
Version 1.0 8 July 2013
3.2.1.2 Templates: A template defines all or a significant subset of the required JTR
configuration parameters.
Templates are typically frequently used configurations,
enabling the J-TNT (JENM) user to create a plan with the template, rather than entering
all the parameters individually. J-TNT (JENM) has two types of templates: preset and
scenario.
3.2.1.2.1 Preset Templates: Preset templates capture a layout of the required platform
and waveform operational parameters for preset conditions that are applicable to radios.
Under each preset the configuration data is organized into logical areas. These areas
are listed below and have separate elements within the plan development tree:
Platform – the Platform defines common platform parameters such as Local Area
Network (LAN) or other IP application related parameters across all radio types
Radio Applications – the Radio Applications define radio type specific application
settings for proper radio channel setup (e.g. power management settings, etc.)
Waveform Application – the Waveform Application defines the waveform parameters
and the selection of waveform profiles
Preset templates may be imported from other Plans.
3.2.1.2.2 Scenario Templates: A Scenario template captures a set of Preset templates.
This is a time-based scenario for a given mission and allows the network planner to
organize and order the preset settings in a Plan.
3.2.1.3 Networks: The Networks Planning Element is an advanced capability providing
the network planner the capability to capture all of the generated nodes as a result of
associating templates to radio inventory items in a Plan. The difference between a node
and radio inventory item is explained below.
The radio inventory item data set defines the radio’s physical settings that are not preset
dependent.
A Node under a network represents an Inventory item on an RF network.
I8
Version 1.0 8 July 2013
3.2.2 Generate Configuration: Per Plan, J-TNT (JENM) generates a set of
Downloader Configuration files (DCF) to download to external physical media (SKL, CD,
etc.) or the end physical radio. J-TNT (JENM) also generates a single Manager
Configuration file (MCF) to set up management access and load known network
settings.
3.2.2.1 Plan Validation: The J-TNT (JENM) provides continuous validation of the
information defined and maintained within a Plan and the Globals list. The J-TNT
(JENM) provides notifications to the network planner during all phases of planning.
3.2.2.2 Report Generation: The J-TNT (JENM) allows the network planner to generate,
view, and save reports on the current Plan or the Globals List. Reports are saved as a
Portable Document Format (PDF) documents. A saved report may be signed and
exported to external media.
3.2.2.3 File Import: The J-TNT (JENM) allows the network planner to import
information for use in planning. J-TNT (JENM) accepts:
Planner Data files (.xml format)
Global Data files (.xml format)
ACES generated files (.xml format)
LMD/KP generated Black Key files (.xml format)
Radio or Waveform Profiles (.xml format)
3.2.2.4 File Export
The J-TNT (JENM) allows the network planner to export information maintained within
the J-TNT (JENM) database. The information in the J-TNT (JENM), available for
export, is listed below: The Planner Data file containing data from the entire Plan. The
Globals Data file contains data from a Global list. The Mission Configuration files, and
Reports are PDF files that can export.
Any file exported from J-TNT (JENM) is tagged with the J-TNT (JENM) system security
classification level and the J-TNT (JENM) version number and is digitally signed for
authenticity.
4.0 J-TNT Monitoring and Management: The J-TNT (JENM) provides network
monitoring and management services for deployed SRW networks. A network is
managed through the Network Management Access Node (NMAN). The NMAN is a
locally-connected radio chosen by the user that provides a view of the network as seen
through that node. All management information is obtained through the NMAN, and
monitoring information is displayed logically, not geographically. J-TNT (JENM)
manages multi-domain network topologies. Reports and graphs are available to the
user for a more detailed analysis of the network being managed. Alarm features are
provided to identify problems in the network. The J-TNT (JENM) platform does not
create any management (SNMP) over-the-air traffic, and all management activities are
done with minimal impact to the network’s performance.
I9
Version 1.0 8 July 2013
4.1 Network Topology Monitoring: Network Topology Monitoring observes the network
in the background to collect and display a node and link status; see Figure I4 ( for a
typical topology view. A user is alerted of SRW network problems by displaying alarms
and topology graphs with status. The alarm level severity is indicated by different colors.
The topology displays are in a hierarchical fashion via a tree; the tree displays the
network as a whole. The displays incorporate interactive icon-based menus for ease of
topology management. Network Topology maintains multiple viewpoints for the
application user:
NMAN – the NMAN Topology Function displays the NMAN and all the available
channels on this radio. From the NMAN view, the operator may select a radio channel
and its associated network to monitor.
Channel – the Channel Topology Function displays the NMAN with all its visible Island
Heads (IH). The Channel viewpoint uses the binding Network Visualization Table (NVT)
(which collects topology information provided by the Link State Advertisements (LSAs)
that are part of the SRW waveform protocol).
Subnet – the Subnet Topology displays the network from a RF IP connectivity
standpoint.
Island – the Island Topology displays the network from the viewpoint of an Island. The
view includes the Island head with all the network nodes in that island. When displaying
multi-tier networks, the Island Topology display includes group icons that represent the
summary status of the underlying sub-networks. The Island viewpoint uses the binding
NVT table information provided by SRW.
Figure I4 (Island Topology (Typical))
5.0 Fault Management Function: The J-TNT (JENM) provides the option to view and
I10
Version 1.0 8 July 2013
manage the network’s recorded alarms. The user may sort fault information (alarms)
and choose the output format for display. Counts of the various alarm types are
displayed to the user in a color-coded alarm count table. A topology display’s visual
indicators also assist in identifying network issues; visual indicators are in the form of
different colors, line weights for links, and providing alarm acknowledgements and notes
regarding specific faults displayed. See Figure I5 for a sample Event / Alarm Status
Display.
Figure I5: Event / Alarm Status Display
6.0 Reports Function: The J-TNT (JENM) provides the option to view MIB objects,
from the NMAN radio, in a table (in real time) or while creating graphs and reports.
Reports may be generated for the: Network Visualization Tool (NVT) table, routing
tables, neighbor tables, statistics, and status tables.
The reports are based upon selected MIB objects; these are from standard industry
MIBs, platform unique MIBs, and SRW waveform MIBs.
7.0 J-TNT (RBSAM) Monitoring: The J-TNT (RBSAM) provides radio monitoring
services for deployed ANW2 and SRW networks in two fashions, the primary monitoring
software application for radio situational awareness is through the Radio Based
Situational Awareness Software application. This software allows the S-6 to see all of
radios in the net base upon echelon.
RBSA is a software capability within the SOFTWARE DEFINED RADIOS (SDR) family
of radios that are enable them to broadcast Position Location Information (PLI) though
the network. Each radio acts as a beacon and can send SA periodically based on time,
distances traveled, or Push-To-Talk (PTT) transmission.
On many mounted platforms, RBSA can be captured directly on J-TNT display or other
Command and Control (C2) system through the Internet Controller (INC). RBSA
beacons flow from the SOFTWARE DEFINED RADIOS (SDR) radios to the INC where
they are directed to the J-TNT computer. J-TNT equipped units can now use these
RBSA beacons to add SA from dismounted and mounted platforms that have a
SOFTWARE DEFINED RADIOS (SDR) radio. See Figure I6 Below:
FEATURES: RBSA position information can be displayed on the J-TNT at any echelon
using Radio Based Situation Awareness Software. Allows disadvantaged units to
provide PLI without any additional equipment.
I11
Version 1.0 8 July 2013
KEY OPERATIONAL BENEFITS: Provides the Tactical Operations Center (TOC)
increased battlespace visibility and creates a more complete “blue” picture SA
information can flow from dismount and vehicular units to the upper Tactical Internet
(TI). No user intervention is required to beacon the position. Uses current fielded
equipment.
Figure I6 (Radio Based Situation Awareness Monitoring (RBSAM))
8.0 User Access Management: User Access Management provides role-based access
control based on user sub-roles (Status, Statistics, and Control). The user’s and MIB
object’s access classifications define the MIB object’s visibility to the user as follows.
Status – view topology, alarms, events, status MIB parameters, and access related
reports and graphs
Statistics – all status functions plus view or reset of statistics MIB parameters
Control – all statistics functions plus the ability to view and modify a limited set of
platform and waveform parameters.
9.0 J-TNT Miscellaneous: Presets are used to reconfigure an operational SRW radio.
The number of presets is radio dependent.
Presets are defined during network
planning and loaded onto the radio before the radio is operational.
J-TNT may read the NMAN MIB.
J-TNT does not have the capability to command the JTR to zeroize.
does have a command to zeroize itself.
J-TNT (JENM)
I12
Version 1.0 8 July 2013
10.0 Conclusion: The ITNE Network Management products provide a range of
monitoring / management capability to enhance the Warfighters’ Situational Awareness
into the performance and topology of the ITNE. To ensure the Network Management
products are tailored to the needs of the Warfighter, support from user groups is needed
to define the monitoring / performance / topology data that is required at each echelon.
I13
Version 1.0 8 July 2013
Left Blank
I14
Version 1.0 8 July 2013
Appendix J
(Aviation Integration)
Appendix J Aviation Integration will be completed on a future update of the ITNE
CONOPS
J1
Version 1.0 8 July 2013
Left Blank
J2
Version 0.4 10 June 2013
Appendix K
(Unit Task Reorganization)
1.0 Background: Capability Set 13 introduced new ITNE technology within Army
tactical formations at a level never before experienced. These technologies reach all
the way from the BCT Main to the individual squad member. The huge increase in
systems created a vastly more complex network environment. At the company level
alone, there is over a two hundred percent increase in the number of networking
devices utilizing IP addressing and spectrum space. This increase in systems created a
massive increase in the number of soldier tasks associated with ITNE Signal
Operations. These tasks are still being worked out for successive capability sets and
are anticipated to generate the need for additional organic support requirements within
the battalion S-6 staff to accommodate the planning, management, and analysis
required to operate the ITNE for the commander.
Since the initial fielding of these ITNE systems in fiscal year 2012, the Army, through
the Assistant Secretary of the Army for Acquisition, Logistics, and Technology
(ASA(ALT)), provided supporting contract personnel to assist in all facets of planning
and management of the ITNE. ITNE Signal Operations as defined in this CONOPS is
primarily performed by a number of ASA(ALT) program managers, organizations, and
contractors. The only portion performed by soldiers to date is the Network Build Phase
and the Network Load/Verification Phase of the ITNE Planning Process. The first three
phases are currently executed by ASA(ALT). Until units are able to properly execute all
the steps of the ITNE Planning Process, they will run a high risk of properly managing
their network once operational if there are any issues related to the SSA, RPPA, NP,
and ND. These products and their associated predecessor steps must be owned and
performed by the S-6 in order for the responsible commander to truly control their
tactical network.
One of the most glaring examples of the unit’s limitations to conduct ITNE Signal
Operations within the ITNE Planning Process is the case of a task reorganization order.
The S-6 is not able to execute the full range of task organization formation possibilities
for ITNE component devices without the current assistance of field service support
representatives (FSRs) and/or direct ASA(ALT) program manager contract support.
These dependencies prevent the proper execution of ITNE Signal Operations in support
of task reorganization within required planning and execution times of Phase III and IV
operations.
In an effort to better define and explain the appropriate processes for the S-6 under
these conditions, this annex was drafted to highlight the actions necessary for the S-6 to
properly execute ITNE Signal Operations in support of a task reorganization. The
process of planning and executing a task organization within ITNE Signal Operations is
termed a unit task reorganization (UTR).
K1
Version 0.4 10 June 2013
2.0 Unit Task Reorganization (UTR): A UTR is the process performed by an S-6 staff
upon receipt of the commander’s Operations Order during combat operations that
translates mission command MDMP task organization changes into specific actions
required by the S-6 to modify the communications (Voice/Data) network to match the
modified unit structure. The UTR process follows the ITNE Planning Process and
results in a modified NP, ND, and MCF along with the updated Signal Estimate and
Signal Annex for the operations order.
The complexity of a UTR can range from a very simple modification involving only a few
ITNE component devices and ITNE Planning Process steps to a full scale planning
effort of all ITNE components requiring all steps of the ITNE Planning Process. Either
way, the S-6 is required to understand and execute these steps in support of a UTR
during all phases of operations under any METT-TC set of conditions.
3.0 Baseline unit force structure: All tactical forces in the U.S. Army fall under an
approved force structure document. These force structure documents form the baseline
structure of a unit as it goes to war. The primary approved and resourced force
structure document is the modified table of organization and equipment (MTOE). This
document establishes the personnel, equipment, and organization structure of a unit
before any task organization occurs. The units involved are termed pure which means
they contain all the approved personnel, equipment, and organizational structure to
execute all phases of operation for that level of command. All movement of those
forces from their MTOE command level to other command levels or alternate
commands without a change in the organizational structure, personnel, and equipment
is considered a pure task organization. Pure task organizations are considered the
simplest form of task organization as it involves the smallest amount of change. When
MTOE units are combined, mixed, and/or altered, the complexity level drastically
increases for the S-6 as the personnel, equipment, and organizational structure are all
changed from the baseline plan. Based on the amount of change, the S-6 could face a
complete re-plan of their unit’s network requiring a complete execution of the ITNE
Planning Process.
3.1 Baseline Force Structure Documents: The following force structure documents
provide the baseline organizational architecture for U.S. Army Forces. The MTOE, as
discussed above, is the primary document influencing the UTR process for the S-6 as it
provides the baseline structure for the personnel, equipment, and organizational
structure on which the ITNE NP, ND, and MCF are built. Each TOE has a unique
number that identifies it. When changes are needed, a table is not modified; instead, a
new table is drafted from scratch.
3.1.1 Baseline Table of Organization and Equipment (BTOE): The Base Table of
Organization and Equipment (BTOE) is an organizational design document based on
current doctrine and available equipment. It shows the basics of a unit's structure and
their wartime requirements (both for personnel and equipment).
K2
Version 0.4 10 June 2013
3.1.2 Objective Table of Organization and Equipment (OTOE): The Objective Table
of Organization and Equipment (OTOE) is an updated form of the BTOE, usually formed
within the last year. It is a fully modern document and is up to date with current policies
and initiatives.
3.1.3 Modified Table of Organization and Equipment (MTOE): A Modified Table of
Organization and Equipment (MTOE) is a document that modifies a BTOE in regard to a
specific unit. Used when a unit's needs are substantially different from the BTOE.
3.1.4 Table of distribution and allowances (TDA): A Table of Allowances is a
temporary TOE that is applicable to a specific mission. Used in an instance when there
is no applicable TOE or for non-warfighting units.
3.2 The Brigade Combat Team (BCT): The Brigade Combat Team (BCT) is the basic
deployable unit of maneuver in the US Army. A brigade combat team consists of one
combat arms branch maneuver brigade, and its attached support and fire units. A
brigade combat team carries with it support units necessary to sustain its operations
away from its parent division. Since the Army has implemented these BCTs, divisions
that previously had not deployed individual brigades due to lack of integral support have
now been restructured and now have the ability to deploy one or more BCTs anywhere
in the world. These BCTs will be able to stand on their own, like a division in miniature.
The infantry brigade combat team is organized around two battalions of infantry. Each
type of brigade (light infantry, air assault, or airborne) has the same basic organization.
Each infantry brigade is capable of air assault operations, whether or not it is officially
designated as an air assault brigade. Also, most units typically maneuver in vehicles
when deployed and operate as "motorized infantry" to facilitate speed of movement.
3.2.1 The Infantry Brigade Combat Team (IBCT): The Infantry Brigade Combat Team
(IBCT) consists of six battalions: two infantry battalions and one each of cavalry
(RSTA), fires, special troops, and brigade support.
K3
Version 0.4 10 June 2013
Figure K1
3.2.2 The Stryker Brigade Combat Team (SBCT): The Stryker Brigade Combat
Team (SBCT) is a mechanized infantry force structured around the Stryker eightwheeled variant of the "interim armored vehicle" for the US Army. A full Stryker brigade
was intended to be C-130 Hercules air transportable into theatre within 96 hours, while
a division-sized force is expected to need 120 hours. The Stryker brigade is an organic
combined arms unit of light armored vehicles, and is organized differently than the
infantry or armored brigade combat teams. The Stryker brigades are being used to
implement network-centric warfare doctrines, and are intended to fill a gap between the
United States' highly mobile light infantry and its much heavier armored infantry.
Each Stryker brigade combat team consists of three infantry battalions, one
reconnaissance (cavalry) squadron, one fires (artillery) battalion, one brigade support
battalion, one brigade headquarters and Headquarters Company, one network support
company, one military intelligence company, one engineer company, and one anti-tank
company. Unlike the infantry and armored BCTs, there is neither a brigade special
troop’s battalion nor forward support companies in the brigade support battalion for the
five maneuver elements.
K4
Version 0.4 10 June 2013
Figure K2
3.2.3 The Armored Brigade Combat Team (ABCT): The Armored Brigade Combat
Team (ABCT) is the army's primary armored force. It will be designed around combined
arms battalions that contain both M1 Abrams tanks and M2 Bradley infantry fighting
vehicles (IFVs). Other vehicles, such as HMMWVs, MATVs, and variants of the M113
armored personnel carrier, operate in a supporting role. The armored brigade combat
team consists of six battalions: two combined arms and one each of armored
reconnaissance (cavalry), fires (artillery), special troops, and support.
Figure K3
K5
Version 0.4 10 June 2013
4.0 UTR Process: During the ITNE Planning Process for a UTR, it is imperative that
the S-6 quickly gauge their ability to execute the UTR within a certain period of time.
This is to ensure the S-6 can provide a risk assessment to their commander on the
likelihood of UTR success given the time provided. Where the time frames will not meet
the execution of a UTR to standard, the S-6 must quickly notify the commander and
provide alternative approaches by trading capability to ensure some measure of
network connectivity and services. The connectivity and services chosen for the time
frame involved should meet the commander’s information priorities noted in the Signal
Analysis Phase of the ITNE Planning Process. Notification of UTR time requirements
must be given to the command and staff in the early stages of the ITNE Planning
Process. This must occur as soon after receiving the approved task organization as
possible.
The commander will always set information flow priorities on the network. However,
until that direction is provided, the S-6 should always start their prioritization of
communications and network capability based on the establishment of the transport and
networking components of the ITNE before the mission command application capability.
The following is a high level list of capability priorities during ITNE UTR planning and
execution operations.
Priority 1: Local Transport: (Radio Platforms: SINCGARS, SRW, and Mid Tier
waveforms)
Priority 2: Mission Command Applications (JBC-P, Nett Warrior) capable of running on
the local transport only.
Priority 3: Wide Area Transport (Ancillary Devices: Tier III routers, cross domain
solutions, and gateways) to link together the local transport.
Priority 4: Mission Command Applications (JBC-P, Nett Warrior) to run data services
across the wide are transport.
Note: Voice capability is always the first priority over mission command data.
There are two types of UTRs in the United States Army. There are pre-planned UTRs
and unplanned UTRs. By definition, the planned UTR is instantaneous upon execution
as a preset on a radio platform or networked ancillary device. The time involved in
executing the ITNE Planning Process for a pre-planned UTR is done before mission
time and is therefore inconsequential to the S-6 and their staff during mission
operations. However, the need to follow the INTE Planning Process from beginning to
end is essential to ensure the pre-planned network is functional and meets all of the
pre-planned UTR task organization information flow requirements. Failure to ensure
this before loading that pre-planned UTR for a mission could cause an unforeseen
failure during mission operations and result in catastrophic loss of communications and
K6
Version 0.4 10 June 2013
network capability. The S-6 must ensure they complete the Verify OPNET process
between the ITNE Planning Process and the ITNE Management Process for all preplanned UTRs.
Unplanned UTRs are much more difficult due to the need to execute the ITNE Planning
Process and Verify OPNET process during mission time. In order to properly handle
the risk associated with the time requirements for unplanned UTRs, the S-6 must be
able to conduct a quick estimate on the time required to complete the ITNE Planning
Process and Verify OPNET process for their commander in order to ensure there is
sufficient time to execute the task organization specified. An inability to estimate the
UTR time during the Signal Analysis Phase could result in a failure to complete the
ITNE Planning Process and Verify OPNET Process in time for mission execution thus
jeopardizing the entire mission and command.
The S-6 mitigates the risk associated with UTR time estimation and mission execution
time requirements by determining the level of complexity for the particular UTR as a
measure of soldier tasks required. This is a subjective assessment to help the S-6
organize their staff. Secondly, the S-6 actually calculates an estimated time factor
based on a formula designed to equate system ITNE Planning Process and Verify
OPNET time with UTR time. The UTR categories of complexity are noted in Table K1
below. The UTR completion time calculation is discussed in paragraph 4.2.
4.1 UTR Complexity Categorization: Table K1 below illustrates the complexity
categorizations for UTRs along with the narrative definitions for each complexity factor.
UTR (Category 1)
1A1
1A2
1A3
1B1
1B2
1B3
1C1
1C2
1C3
UTR (Category 2)
2A1
2A2
2A3
2B1
2B2
2B3
2C1
2C2
2C3
Organizational Modification
All
B/I
B
All
B/I
B
All
B/I
B
Organizational Modification
All
B/I
B
All
B/I
B
All
B/I
B
Network Tiers
T/A/C
T/A/C
T/A/C
T/A
T/A
T/A
T
T
T
Network Tiers
T/A/C
T/A/C
T/A/C
T/A
T/A
T/A
T
T
T
ITNE and/or UTI
Both
Both
Both
Both
Both
Both
Both
Both
Both
ITNE and/or UTI
ITNE
ITNE
ITNE
ITNE
ITNE
ITNE
ITNE
ITNE
ITNE
Table K1
K7
Version 0.4 10 June 2013
4.1.1 Organizational Modification: This UTR complexity factor measures the relative
complexity of the task organization structure deviation from the unit’s specific MTOE.
4.1.1.1 Basic Task Organization (TO): This is defined as a task organization that
includes only the movement of pure Army formations with no alteration to the existing
MTOE structure of those units. These units are pre-planned based on Army wide
lessons learned for task organization. This includes squads within platoons, platoons
within companies, companies within battalions, battalions within BCTs, BCTs within
Divisions, and Divisions within Corps. This can include the movement of an element at
two to three command levels higher but never higher to lower (e.g. company to Division
or battalion to Corps).
4.1.1.2 Intermediate Task Organization (TO): This is defined as a task organization
that includes the Basic TO plus those pre-planned task organizational structures the unit
sees fit to satisfy planned METT-TC requirements. These pre-planned unit task
organization templates include both pure as well as modified unit structure that involves
the addition and/or deletion of capability as defined in the MTOE. These variations can
result in unit structures such as company teams (additions of platoons, squads, and
special teams) and battalion task forces (additions of companies, platoons, squads, and
special teams). Modified configurations at BCT, Division, and Corps level are included
in this definition so long as they meet the anticipated METT-TC requirements of a unit.
4.1.1.3 Advanced Task Organization (TO): This is defined as a task organization that
includes both the Basic and Intermediation TOs as well as required un-planned task
organizations based on unforeseen METT-TC requirements. These un-planned
missions include any combination and/or variety of unit composition as required by
METT-TC and available units to the command.
4.1.2 Network Tiers: This UTR complexity factor measures the relative complexity of
the volume of network systems based on the number of required network tiers affected
by the UTR.
4.1.2.1 Terrestrial Tier: This is defined as a task organization that requires the
addition, deletion, and/or modification of only terrestrial based communications and
networking systems. This includes all systems required or dependent upon ITNE lower
and mid tier networks..
4.1.2.2 Aerial Tier: This is defined as a task organization that requires the addition,
deletion, and/or modification of aerial based communications and network systems.
This includes all systems required or dependent upon ITNE lower tier and mid tier
networks that access the aerial tier.
4.1.2.3 Celestial Tier: This is defined as a task organization that requires the addition,
deletion, and/or modification of celestial based communications and network systems.
This includes all systems required or dependent upon ITNE lower tier and mid tier
networks that access the celestial tier.
K8
Version 0.4 10 June 2013
4.1.3 Network Levels: This UTR complexity factor measures the relative complexity of
the interconnectivity planning required between the Upper Tactical Internet (UTI)
network and systems and the ITNE network and systems based on the amount of
interconnection and crossbanding points required for the particular UTR.
4.1.3.1 ITNE: This is defined as all the components of the ITNE capability required for
the designated UTR. Although the scale and volume of systems is highly variable
based on the type of UTR, the focus is on the need to focus on internal routing and
configuration for ITNE or the interoperable connectivity to the UTI.
4.1.3.1 UTI: This is defined as all the components of the UTI capability required for the
designated UTR. Although the scale and volume of systems is highly variable based on
the type of UTR, the focus is on the need to focus on amount of interoperable
connectivity points with the ITNE.
4.2 UTR Completion Time Calculation: The S-6 and their staff can quickly estimate
the amount of time it takes to plan, configure, load, initialize, and validate a set of
networks to match a UTR by applying the following formula.
This equation provides the estimated time required to complete a specified UTR. This
is accomplished through the summation of all of the ITNE Planning Process and Verify
OPNET times associated with all the systems of all the networks requiring modification
and or creation to support the published task organization.
The Xi variable represents the total number of a specific network and the Ti variable
represents the ITNE Planning Process and Verify OPNET time required for that specific
network as a function of the summation of all the system ITNE Planning Process and
Verify OPNET times required for the systems within that network. The
simply
identifies the need to calculate the total time (summation) of all the specified networks
(Xi) and their corresponding ITNE Planning Process and Verify OPNET times (Ti)
required for the UTR.
As already stated, the Ti variable is based on an estimated time to complete the ITNE
Planning and Verify OPNET Processes for each system within a particular network.
Networks are defined for purposes of this CONOPS based on waveform and all their
corresponding networked systems with applicable ITNE planning process and Verify
OPNET estimated times. The planning times assigned to these networks are identified
in Table K2 below along with the description of the network. It is well understood that
there are literally an infinite number of network combinations a unit could design for a
UTR. However, in the interest of establishing some means to measure UTR planning
times, this CONOPS establishes a default set of network definitions. Over time, this list
K9
Version 0.4 10 June 2013
can easily be modified, updated, or changed to meet the needs of any unit based on
their specific planning times for the defined networks.
The planning times documented in this CONOPS are averages of information collected
to date from Capability Set Fielding’s, Network Integration Exercises (NIEs), and
analysis performed by Assistant Secretary of the Army for Acquisition, Logistics, and
Technology (ASA(ALT)), Training and Doctrine Command (TRADOC) Capability
Managers, and science and research centers. The times listed in Table K2 below are
only estimates, do not represent exact times, and are subjective in nature based on
expert opinion and some observed fact. In the mid to long term (CS 15 and beyond), it
is best if each unit develop their own ITNE planning process estimates and place them
in their own UTR ITNE Planning Process Time Table.
4.3 Calculating the TUTR: There are a few steps the S-6 and there staff should follow in
leading up to the calculation for the TUTR. They are as follows:
Step 1: The S-6 must determine the organizations that need to be modified (e.g.
platoons, companies, etc) based on the mission.
Step 2: The S-6 must calculate the number of networks that need to be created or
modified based on Step 1.
NNET = number of networks that need to be created or modified
= NSINC + NSRW + NMUOS + NSATCOM + NANW2 + NWNW + NHF
such that NSINC = number of SINCGARS networks
such that NSRW = number of SRW networks
such that NMUOS = number of MUOS networks
such that NSATCOM = number of SATCOM networks
such that NANW2 = number of ANW2 networks
such that NWNW = number of WNW networks
such that NHF = number of narrowband HF networks
Step 3: Using Table K2 below, the S-6 is able to estimate the time completion required
for a particular UTR based on the ITNE Planning Process and Verify OPNET time
frames.
Each time estimate from the table below =
for each network type
K10
Version 0.4 10 June 2013
Lower Tier:
Network
Type
Network Description
Network
Complexity
SINC
Terrestrial
Basic
SRW
Terrestrial
Basic
MUOS
Celestial
Basic
SATCOM
Celestial
Basic
SINC SRW
Terrestrial
Intermediate
SINC SRW
Terrestrial Aerial
Intermediate
SINC
MUOS
Terrestrial Celestial
Intermediate
SINC
SATCOM
Terrestrial Celestial
Intermediate
SRW
MUOS
Terrestrial Celestial
Intermediate
SRW
SATCOM
Terrestrial Celestial
Intermediate
MUOS
SATCOM
Celestial
Intermediate
SINC SRW
MUOS
Terrestrial Celestial
Advanced
SINC SRW
MUOS
Terrestrial Aerial
Celestial
Advanced
SINC SRW
SATCOM
Terrestrial Celestial
Advanced
SINC SRW
SATCOM
Terrestrial Aerial
Celestial
Advanced
SINC SRW
MUOS
SATCOM
Terrestrial Aerial
Celestial
Complex
Systems
(minutes)
Mid Tier
Network
Type
Network Description
Network
Complexity
ANW2
Terrestrial
Basic
WNW
Terrestrial
Basic
HF
Terrestrial
Basic
ANW2
Terrestrial
Intermediate
Systems
(minutes)
K11
Version 0.4 10 June 2013
WNW
ANW2
WNW
Terrestrial Aerial
Intermediate
ANW2 HF
Terrestrial
Intermediate
ANW2 HF
Terrestrial Aerial
Intermediate
WNW HF
Terrestrial
Intermediate
WNW HF
Terrestrial Aerial
Intermediate
ANW2
WNW HF
Terrestrial Celestial
Advanced
Table K2
5.0 Planning Considerations: UTR NPs, NDs, and MCFs can be planned and loaded
as a preset on ITNE component devices expected to utilize that network design for a
particular set of missions. These UTRs range across all categories listed under
paragraph 4.0 above and are only limited to the imagination of the commander and their
staff in preparing for contingencies. There is a limitation on the number of loadable
preset space available on particular radios. This is based on the radio design and
hardware and software limitations. This will change with time and vary by radio design.
For example, the Rifleman Radio (PRC-154) can hold up to fifty presets while the
Manpack Radio (PRC-155) can hold up to 100 presets operating with two simultaneous
channels.
Preset space is a precious resource for the S-6. There is always a need to use a
percentage of preset space for high probability task organization scenarios. In effect,
these should be baked in doctrinal presets for the movement or pure fleeted units as
discussed earlier in this appendix. However, there is also a need for each unit to
develop their own planned task organizations that go beyond pure fleeted organizational
movements and include more CAT1 and CAT 2 A/B type organizational structures to
meet their unique mission requirements. A good S-6 always leaves room on a radio for
these kinds of mission specific pre-planned presets.
In the near term (CS 13/14), the S-6 will receive their preset design, the RPPA, from
their ASA (ALT) new equipment fielding (NEF) process. This baseline is formed on the
latest considerations between the unit and the ASA (ALT) network design developers to
facilitate the mission specific and doctrinal level requirements for planned missions.
Over time, this responsibility will migrate directly to the unit rather than the program
managers. Once this occurs, the unit will have the responsibility and control over the
design of their RPPA in the Signal Analysis Phase of the ITNE Planning Process.
Capability Set 13 Detailed Planning Procedures are included under Appendix O of this
CONOPS for use by the S-6 in executing an internal battalion movement of a pure
platoon across companies and an internal BCT movement of a pure company across
battalions. These are CAT2C3 UTRs.
K12
Version 0.4 10 June 2013
Appendix L
(Help Desk Operations)
The help desk provides support for Active Army, Reserve Components and National
Guard as well as support for joint service users, civil agencies and DoD contractor
personnel.
The help desk is operational 24 hours per day, 7 days per week and is reachable via
both a domestic and international toll free number as well as by a dedicated e-mail
address. Currently two lines are active during duty hours: 0800-1700 EST five days
per week. After hours and on weekends, help desks are forwarded to a cell phone
attended by a member of the help desk team to provide 24 hour accessibility. If it
becomes necessary for the on-call help desk designee to gain access to the CSS facility
to troubleshoot technical problems, 24 hour access is made available.
The CSS facility is equipped with supporting equipment including LCMS Workstations,
SKLs loaded with various iterations of the UAS, DTDs loaded with Common Tier 3
(CT3), ACES Workstations, J-TNT platforms, STEs and selected ECUs. This facilitates
the replication and potential resolution of problems identified during trouble calls which
may involve any combination of the interfaces between this suite of equipment. On
occasions, unclassified Plan databases including key assignment data, SOI or
Frequency Resource information is transmitted from field users so that CSS SMEs can
perform detailed analysis and provide assistance and guidance where needed.
CSS subject matter experts supporting the Help Desk are drawn from the on-hand
AKMS staffs who also are involved in supporting PD COMSEC in training, technical
documentation, testing, logistics issues, training development, TM development, and
conference support. This insures that our SMEs retain recurring and frequent contact
with policy developments, current field operations and can take advantage of face to
face interface with warfighters in the field. Our AKMS support staff collectively have
over ninety (90) years of experience in AKMS operations, tactical communications
deployments and hands-on radio and ECU involvement.
L1
Version 0.4 10 June 2013
L2
Version 0.4 10 June 2013
Appendix M
(Tactics, Techniques & Procedures (TTP)
ITNE Format
1. Which ITNE Process is affected by the recommendation?
Processes
Planning
Management
Analysis
2. Which Phase is affected by the recommendation
Phases
Signal Analysis
Receive Mission
Request Frequencies
Analyze CDR Support
Requirements
Request COMSEC
Request URNs
Request RNs
Analyze Asset Aval
Data Collection
Network Build
Request Map Data
Formulate IP Scheme
Radio Network
Configuration File
Mission Configuration
Simulation
Network
Load/Verification
Load Device
Network Design
Steps
Analyze Mission
Analyze Terrain
Network Plan
SAA RPPA
Request IP Range
Request NB
SATCOM
Formulate NRA
Application
Configuration File
ND
Mission Configuration
File
Initialize Network
Conduct
Communication Check
3. Give a brief synopsis of what is currently done:
4. Give a detailed synopsis of the recommendation (use of a separate document may
be required):
5. Is the recommendation one of the following by definition:
a. Tactic: An action or strategy carefully planned to achieve a specific end.
M1
Version 0.4 10 June 2013
b. Technique: A way of carrying out a particular task.
c. Procedure: An established or official way of doing something.
6. Summary of procedure and improvement listed step by step
7. Person submitting information:
Name:
Unit:
email:
Phone number:
Submit all information to:
Kevin Searcy
Fielding and Training Manager, JANUS Research Group
TCM-Tactical Radios/JTRS
US Army Signal Center of Excellence, Ft Gordon, GA
COM: 706-791-5048
CELL: 904-378-6088
[email protected]
M2
Version 0.4 10 June 2013
Appendix N
(Vignette Detailed Information)
1.0 Background: In support of ITNE CONOPS two vignettes Initial Entry Operation
and High Intense Conflict were developed. The vignettes were used to assist in the
development of Signal Operations portion of the CONOPS.
2.0 Initial Entry Operations Vignette: A forcible entry is the seizing and holding of a
military lodgment in the face of armed opposition (JP 3-18). Once the assault force
seizes the lodgment, it normally defends to retain it while the joint force commander
rapidly deploys additional combat power by air and sea. When conditions are favorable,
joint force commanders may combine a forcible entry with other offensive operations in
a coup de main. This action can achieve the strategic objectives in a simultaneous
major operation.
A forcible entry operation can be by parachute, air, or amphibious assault. The Army’s
parachute assault and air assault forces provide a formidable forcible entry capability.
Marine forces specialize in amphibious assault; they also conduct air assaults as part of
amphibious operations. Special operations forces play an important role in forcible
entry; they conduct shaping operations in support of conventional forces while executing
their own missions. These capabilities permit joint force commanders to overwhelm
enemy anti-access measures and quickly insert combat power. The entry force either
resolves the situation or secures a lodgment for delivery of larger forces by aircraft or
ships. The three forms of forcible entry produce complementary and reinforcing effects
that help joint force commanders to seize the initiative early in a campaign.
2.1 Assumptions: In development of this vignette the following assumption were
developed to complete the task.






Air superiority is completed
Lodgment will be used as a base of operation
Lodgment will coordinate with Air force close air support
Ground Force is US Army Air Assault Infantry Battalion
Ground Force operating with Capability Set 15-16
Intelligence Preparation of Battlefield (IPB)
o Found no enemy present on landing zone (LZ).
o Nearest enemy unit (mounted Infantry company) response time 45 min
o Enemy Infantry Battalion size element response time 3 hours
o Enemy air dense limited to man-portable air defense missiles
o Weather favorable for air mobile operations will not be a factor.
o LZ remote location limited contact with local civilians (farmers). Unknown
sympathies with enemy forces
o Terrain: Area around landing zone is wooded, dotted with small farms.
Access to LZ is by two small dirt roads one road entering from east side of LZ
N1
Version 0.4 10 June 2013
and the second dirt road entering from the south. South road intersects a
major paved two lane highway that runs east to west 3 mile south of LZ. East
dirt road spans Small River flowing north to south utilizing a bridge
constructed of wood which seems in poor condition.
2.2 Air Assault Taskforce: Infantry battalions share the same table of organization
and equipment (TOE) and can conduct air assault operations. However, some Infantry
battalions receive regular, intense, and specialized training in air assault and airborne
operations.
Infantry Battalion
METT-TC
I
•Towed 105
I
SPT
AVN
•MAINT
•MEDICAL
•FOOD SRV
•ATK
•UTILITY
•Cargo
ADA
•AVENGER
Figure N1 Air Assault Task Force
2.3 Air Assault Stages of Operation: The five basic plans that constitute an air
assault operation are the ground tactical plan, the landing plan, the air movement plan,
the loading plan, and the staging plan (Figure X). In operations involving units with
organic combat vehicles, the ground tactical plan must also include a linkup plan.
The planning process is very important to the S-6 staff. Once the operation begins it is
very difficult to adjust the communication plan until you complete the full air assault
process at the completion of ground tactical operations and all the management
systems are on the ground and the tactical environment is stable for communication
changes. S-6 planning must account for all stages of the operation and account for
radio nets required, C2, SA, and COP requirement during each phase that the air
assault unit requires, the necessary batteries required to sustain the ITNE and mission
command applications for the length of the air assault operation required to be
accounted for in loading plans.
N2
Version 0.4 10 June 2013
Figure N2 Air Assault Planning Process
2.4. Staging Operations: In staging operation coordinates the order of movement of
personnel, equipment load plans, aircraft requirements and order of movement to a
designated pickup zone (PZ) to be performed. The loads must be ready before the
aircraft arrive at the PZ. During mission planning, the pickup zone commander (PZCO)
will determine the time required for setting up the PZ, and selects times the PZ will be
established (based upon the air assault H-hour).
ITNE Communication scheme in support of Staging Operations: In the planning stages
before starting the staging operation the S-6 Staff and CO Communication Maintainers
must plan, configure, install and test each of the networks addressed below before
execution of the air assault operation. All SOIs, frequencies, COMSEC keys, IP
addresses, Presets, Call Groups, computers/servers and ancillary equipment that must
be reconfigured due to task force organization changes to meet the commander intent
must be loaded and tested before movement to staging area. Loading plans must
account for batteries required to operate the ITNE during the full movements of air
assault operation until supply chains can be reestablished must be accounted for in the
loading plans and priority of movement to PZ.
N3
Version 0.4 10 June 2013
ITNE Infantry BN Nets during Staging Operations
Unit may still be engaged in current operations. Networks will begin transition to staging
operations and nets will reduce membership or turned off for load plan loading. Nets
with * will remain operational
Network
Radio
PZ CTRL Net
FM
*BDE CMD
*BN CMD
TACSAT/MUOS
(AATF CMD)
*AVN OPS
*Fires
FM/TACSAT/MUOS
Descriptions
PZ Commander coordination net between
staging area, PZ points, aircraft to coordinate
movement from staging areas to PZ to meet
time sequence of aircraft movement.
BDE CDR, AATF CDR, Air Mission CDR (C2)
and (SA) coordinating stages of operation
BN CDR (AATF CDR) BN Staff, Air Mission
CDR, CO CDRs coordinate stages of operation
FM/TACSAT
Coordination of all aviation assets
FM
Coordinate ARTY FDC, to Howitzers
Direction
UHF (LOS)
All FOs, TACP, USAF CAS, FSO to coordinate
air support (fast movers)
*MEDVAC
FM
Coordinate medical evacuation
BN O&I
FM
BN ADLOG
FM
BN FIRES
FM/MUOS
*Tactical Air
Direction
BN FIRES
Direction
BFT
WIN-T
*BN Tier 2
FM
L Band SATCOM
KU/KA
WNW
Data
*HHC SRW
SRW
BN Staff & CO’s coordinate operations and
intelligence
S1/S4 Staff & CO’s coordinate HR and Supply
BN FSO, BN FSE, CO FSO, BN Mortars, Follow
on ARTY, ATK AVN coordinate fires
BN FSC, BN FSO, BN Mortars
Network to support JBC-P mobile users
WIN-T TCN/PoP/SNE Upper Tier interface
BN Staff, CO HQ provides high speed MANET
for IP voice, data & video
HHC Voice, Data PLI supports (Net Warrior)
(S)
*CO SRW
(S) X3
*PLT SRW
(S) X9
PLT SRW
(UNCLASS)
X9
SRW
SRW
SRW
CO LDRs and Staff CO, 1SG, PL, PSG, FSO,
MEDIC support voice, data PLI (Nett Warrior)
PLT LDR and Staff PL, PSG, SQUAD LDR, TM
LDR FO, MEDIC support voice, data, PLI (Nett
Warrior)
SQUAD LDRs, TM LDRs, and Teams support
voice and PLI
Table N3 ITNE Networks during Staging Operation
2.5 Pickup Zone (PZ) Operation: The AATFC bases the loading plan on the air
movement and ground tactical plans. The loading plan ensures troops, equipment, and
supplies are loaded on the correct aircraft. It establishes the priority of loads, the bump
plan, and the cross loading of equipment and personnel. Detailed load planning ensures
the battalion arrives at the loading zone (LZ) configured to support the ground tactical
N4
Version 0.4 10 June 2013
operation. A bump plan that ensures essential troops and equipment are loaded ahead
of less critical loads. Planning for the loading plan must include the organization and
operation of the pickup zone (PZ), the loading of aircraft, and the bump plan.
ITNE Communication scheme in support of Loading Operations: In the planning stage
the following communication networks must be addressed. Communications must use
the most secure means available. PZ operations may be conducted under radio
listening silence to avoid electronic detection. This requires detailed planning. If under
radio listening silence, it is imperative that aircrews remain on schedule to allow the
PZCO to keep a smooth flow of troops from the PZ. PZ communications are on the
established FM PZ control net, with transmissions kept to a minimum.
ITNE Infantry BN Nets during Loading Operations
Unit will reduce nets to support loading plans. Networks will begin transition to PZ
operations and nets will reduce membership or turned off for load plan loading. Nets
with * will remain operational until boarding aircraft. Aircraft configured to support C2
operation will be configured to support Nets
Network
Radio
Descriptions
PZ Commander coordination net between
staging area, PZ points, aircraft to
PZ CTRL
FM
coordinate movement from staging areas
Net
to PZ to meet time sequence of aircraft
movement.
BDE CDR, AATF CDR, Air Mission CDR
TACSAT/MUOS
(C2) and (SA) coordinating stages of
BDE CMD
operation
BN CDR (AATF CDR) BN Staff, Air Mission
BN CMD
FM/TACSAT/MUOS
CDR, CO CDRs coordinate stages of
(AATF CMD)
operation
Coordination of all aviation assets
FM/TACSAT
AVN OPS
Coordinate ARTY FDC, to Howitzers
Fires
FM
Direction
All FOs, TACP, USAF CAS, FSO to
Tactical Air
UHF (LOS)
coordinate air support (fast movers)
Direction
Coordinate medical evacuation
FM
MEDVAC
HHC Voice, Data PLI supports (Net
HHC SRW
SRW
Warrior)
(S)
CO LDRs and Staff CO, 1SG, PL,PSG,
CO SRW (S) SRW
FSO, MEDIC support voice, data PLI (Nett
X3
Warrior)
PLT LDR and Staff PL, PSG, SQUAD LDR,
PLT SRW
SRW
TM LDR FO, MEDIC support voice, data,
(S) X9
PLI (Nett Warrior)
SQUAD LDRs, TM LDRs, and Teams
PLT SRW
support voice and PLI
SRW
(UNCLASS)
*
*
*
*
*
*
*
*
*
*
*
X9
Table N4 ITNE Networks during Pickup Zone Operations
N5
Version 0.4 10 June 2013
2.6 Air Movement Operation: The air movement plan is based on the ground tactical
and landing plans. It specifies the schedule and provides instructions for the movement
of troops, equipment, and supplies from the PZ to the LZ. It provides coordinating
instructions regarding air route, air control points (ACPs), aircraft speeds, altitudes,
formations, and fire support. The AATFC develops the air movement plan in conjunction
with the air mission command (AMC) and flight lead.
ITNE Communication scheme in support of Air Movement Operations: S-6 staff
coordinates * nets in C2 aircraft.
ITNE Infantry BN Nets during Air Movement Operations
Networks will be turned off. Nets with * will remain operational until boarding aircraft. Aircraft
configured to support C2 operation will be configured to support Nets
Network
Radio
Descriptions
PZ Commander coordination net between staging
area, PZ points, aircraft to coordinate movement
PZ CTRL Net
FM
from staging areas to PZ to meet time sequence of
aircraft movement.
BDE CDR, AATF CDR, Air Mission CDR (C2) and
TACSAT/MUOS
BDE CMD
(SA) coordinating stages of operation
BN CDR (AATF CDR) BN Staff, Air Mission CDR,
BN CMD
FM/TACSAT/MUOS
CO CDRs coordinate stages of operation
(AATF CMD)
Coordination of all aviation assets
FM/TACSAT
AVN OPS
Coordinate ARTY FDC, to Howitzers
Fires
FM
Direction
All FOs, TACP, USAF CAS, FSO to coordinate air
Tactical Air
UHF (LOS)
support (fast movers)
Direction
Coordinate medical evacuation
FM
MEDVAC
*
*
*
*
*
*
Table N5 ITNE Networks during Movement Operations
2.7 Landing Zone (LZ) Operations: The scheme of maneuver and ground tactical plan
directly affects the selection of LZs, the landing formation, and the amount of combat
power air assaulted into the LZ. The landing plan is planned in conjunction with the
development of the ground tactical plan and supports the assault force commander's
intent and scheme of maneuver he distribution, timing, and sequencing of aircraft into
the LZ. During execution of the landing plan, attack helicopters can provide over-watch
of the LZs, conduct a reconnaissance of the egress flight routes, call for fire (if
designated to do so), and set up a screen for supporting the assault force commander
during the ground tactical plan. The AMC must ensure that the missions of the attack
aircraft are synchronized with the assault helicopters.
ITNE Communication scheme in support of LZ Operations: S-6 and staff coordinate
the activation of key networks upon leaving the aircrafts. RTOs and dismounted
soldiers will turn on radios and reestablish communication systems. Vehicle mounted
communication system (WIN-T, BFT, & WNW) will be establish depending on priority of
flights.
N6
Version 0.4 10 June 2013
ITNE Infantry BN Nets during LZ Operations
Networks will be turned on. C2 Aircraft will still be required to end of LZ operations and
ground C2 SA and COP is established
Network
Radio
Descriptions
BDE CDR, AATF CDR, Air Mission CDR
BDE CMD
TACSAT/MUOS
(C2) and (SA) coordinating stages of
operation
BN CDR (AATF CDR) BN Staff, Air Mission
BN CMD (AATF
FM/TACSAT/MUOS
CDR, CO CDRs coordinate stages of
CMD)
operation
AVN OPS
FM/TACSAT
Coordination of all aviation assets
Fires Direction
FM
Coordinate ARTY FDC, to Howitzers
Tactical Air
All FOs, TACP, USAF CAS, FSO to
UHF (LOS)
Direction
coordinate air support (fast movers)
MEDVAC
FM
Coordinate medical evacuation
BN Staff & CO’s coordinate operations and
BN O&I
FM
intelligence
S1/S4 Staff & CO’s coordinate HR and
BN ADLOG
FM
Supply
BN FSO, BN FSE, CO FSO, BN Mortars,
BN FIRES
FM/MUOS
Follow on ARTY, ATK AVN coordinate fires
BN FIRES
BN FSC, BN FSO, BN Mortars
FM
Direction
BFT
L Band SATCOM
Network to support JBC-P mobile users
WIN-T
KU/KA
WIN-T TCN/PoP/SNE Upper Tier interface
BN Staff, CO HQ provides high speed
BN Tier 2 Data
WNW
MANET for IP voice, data & video
HHC Voice, Data PLI supports (Net
HHC SRW (S)
SRW
Warrior)
CO LDRs and Staff CO, 1SG, PL,PSG, FSO,
CO SRW (S) X3
SRW
MEDIC support voice, data PLI (Nett
Warrior)
PLT LDR and Staff PL, PSG, SQUAD LDR,
*PLT SRW (S) X9 SRW
TM LDR FO, MEDIC support voice, data,
PLI (Nett Warrior)
PLT SRW
SQUAD LDRs, TM LDRs, and Teams
SRW
(UNCLASS) X9
support voice and PLI
Table N6 ITNE Networks during Landing Zone Operations
2.8 Ground Tactical Operations: The Air Assault Task Force Commander (AATFC)
develops a scheme of maneuver to accomplish his mission and seize assigned
objectives. In this vignette the objective is a lodgment to establish a base of operation.
Units will deploy from LZ point and setup security zones around the lodgment until base
is established and additional forces arrive to relieve in place. Figure XX illustrates a INF
BN deployed in security zones on a LZ
ITNE Communication scheme in support of Ground Tactical Operations: In the ground
operations the S-6 Staff and CO communication maintainers must react to changes in
the networks health. Enemy Jamming or compromises in SOI, COMSEC and
frequencies will affect network ability to provide C2, SA and COP.
N7
Version 0.4 10 June 2013
Figure N7 INF BN Ground Operation
N8
Version 0.4 10 June 2013
3.0 Phase III High Intense Combat (HIC) Vignette: Ground Forces execute
simultaneous attacks utilizing any forms of maneuver (envelopment, turning movement,
infiltration, penetration, and frontal attack) against multiple objectives to destroy enemy
combat and sustainment power, and continue to shape respective engagement areas in
order to maintain continuous pressure on enemy forces. Units in contact continue to
isolate and reduce segments of enemy combat power and destroy identifiable high
priority targets (HPTs). Units isolate objective areas with lethal and nonlethal fires and
maneuver to mitigate the effects of enemy centers of gravity. Units continue to deny the
enemy of SA. Long-range and persistent engagements shift to isolate selected assault
areas, enabling the assault units to conduct maneuver directly onto their objectives.
Force protection assets quickly secure friendly lines of communications and network
nodes. The BCT’s synchronized and integrate efforts with reconnaissance elements
and supporting assets to enable maneuver and maintain force protection. RSTA
elements and ARH work with UAVs to support R&S in order to observe gaps and dead
space, providing early warning of enemy movement, and detect toxic industrial chemical
or chemical warfare agent (CWA) releases and minefields. BCTs conduct BDA
estimates and detect enemy reaction to commander’s effects and decisive actions.
3.1 Maneuver Frontal Attack Maneuver using an IBCT. A frontal attack is a form of
maneuver in which an attacking force seeks to destroy a weaker enemy force or fix a
larger enemy force in place over a broad front. The BCT can conduct a frontal attack
against a stationary enemy or a moving enemy force (Figure 4.4). Depending upon the
terrain and enemy, this may not be enough force to execute across a wide front. The
IBCT and Heavy Brigade Combat Team (HBCT) must be judicious when deciding to
conduct a frontal attack, because they have only two maneuver/combined arms
battalions to execute this maneuver
Frontal Attack Maneuver
Figure N8 Frontal Attack Maneuver
N9
Version 0.4 10 June 2013
3.2 Sequence of Offensive Operations: The commander maneuvers his forces to
gain positional advantage so he can seize, retain, and exploit the initiative. He avoids
the enemy’s defensive strength. He employs tactics that defeat the enemy by attacking
through a point of relative weakness, such as a flank, a gap between units, or the rear.
Offensive operations typically follow this sequence:
3.2.1 Moving from the assembly area to the line of departure (LD). The tactical
situation and the order in which the commander wants his subordinate units to arrive at
their attack positions govern the march formation.
3.2.2 Maneuvering from the line of departure to the probable line of deployment
(PLD). Units move rapidly through their attack positions and across the LD, which
should be controlled by friendly forces. The commander considers the mission, enemy,
terrain and weather, troops and support available, time available, and civil
considerations (METT-TC) when choosing the combat formation that best balances
firepower, tempo, security, and control.
3.2.3 Actions at the PLD, assault position. The attacking unit splits into one or more
assault and support forces as it reaches the PLD, if not already accomplished. All forces
supporting the assault should be set in their support by fire position before the assault
force crosses the LD. The assault force maneuvers against or around the enemy to take
advantage of the support force’s efforts to suppress targeted enemy positions.
3.2.4 Conducting the breach. As necessary, the BCT conducts combined arms
breaching operations. The preferred method of fighting through a defended obstacle is
to employ an in-stride breach. However, the commander must be prepared to conduct
deliberate breaching operations.
3.2.5 Assaulting the objective. The commander employs all means of fire support to
destroy and suppress the enemy, and sustain the momentum of the attack. Attacking
units move as quickly as possible onto and through the objective. Depending on the
size and preparation of enemy forces, it may be necessary to isolate and destroy
portions of the enemy in sequence.
3.2.6 Consolidating on the objective. Immediately after a successful assault, the
attacking unit seeks to exploit its success. It may be necessary, though, to consolidate
its gains. Consolidation can vary from repositioning force and security elements on the
objective, to a reorganization of the attacking force, to the organization and detailed
improvement of the position for defense.
3.2.7 Transition. After seizing the objective, the unit transitions to some other type of
military operation. This operation could be the exploitation or pursuit, or perhaps a
defense. Transitions (through branches and sequels) are addressed and planned prior
to the offensive operation being undertaken.
3.3 Assumptions: In development of this vignette the following assumption were used
to complete the task.
N10
Version 0.4 10 June 2013




Air superiority is completed
Ground Force is US Army Infantry Brigade Combat Team (IBCT)
Ground Force operating with Capability Set 15-16
Intelligence Preparation of Battlefield (IPB)
o Enemy light infantry company present on both AXIS (New Jersey and New
York) and into Objective Giant and Jets.
o CAB 1 & CAB 2 will engage enemy infantry platoon size element before
crossing phase line (PL) Mark
o Enemy air dense limited to man-portable air defense missiles
o Weather is favorable for night operations.
o Terrain: Open terrain with small hills. A large hill with a saddle is between
OBJ Giants and Jets.
3.4 Vignette Taskforce Infantry Brigade Combat Team (IBCT): The IBCT is the
Army’s lightest BCT, and is organized around dismounted Infantry, capable of airborne
or air assault operations (Figure x). Each of the three types of IBCT (light Infantry, air
assault, or airborne) have the same basic organization. IBCTs require less strategic lift
and logistical support than other BCTs. When supported with intra-theater airlift, IBCTs
have theater-wide operational reach. Organic antitank, military intelligence, artillery,
signal, engineer, reconnaissance, and sustainment elements enable the IBCT
commander to employ the force in combined arms formations. IBCTs are optimized for
operations in close terrain, such as swamps, woods, hilly and mountainous areas, and
densely populated areas.
IBCT
Figure N9 Infantry Brigade Combat Team
N11
Version 0.4 10 June 2013
3.5 IBCT ITNE Networks and Services:
IBCT Networks
Network
WIN-T
DIV CMD
DIV OPS/INTEL
DIV ADMIN
DIV FIRES
WIN-T
BDE CMD
BDE OPS/INTEL
BDE ADMIN
BDE FIRES
Fires Direction
Tactical Air
Direction
MEDVAC
BFT 2
BDE Tier 2 Data
Following Network within IBCT HQ and Battalions
Radio
Descriptions
Div Upper Tier
Connect to the GIG
Communication Network to the
GIG supporting Voice, Data, Video
TCN, PoP, SNE
and network services at a TOC and
OTM CDR vehicles
Upper Echelon CNR(Division Nets)
Monitored by BDE
DIV CDR and Subordinate BDE
SINCGARS/TACSAT/MUOS
CDRs
DIV S2/S3 OPS and Subordinate
SINCGARS/TACSAT/MUOS
BDE S2/S3 OPS
DIV S1/S4 OPS and Subordinate
SINCGARS/TACSAT/MUOS
BDE S1/S4 OPS
DIV FIRES and Subordinate BDE
SINCGARS/TACSAT/MUOS
FIRES OPS
BDE Upper Tier
Connect to the GIG
Communication Network to the
GIG supporting Voice, Data, Video
TCN, PoP, SNE
and network services at a TOC and
OTM CDR vehicles
BDE CNR Net
Monitored by all BNs
BDE CDR and Subordinate BN
SINCGARS/TACSAT/MUOS
CDRs
BDE S2/S3 OPS and Subordinate
SINCGARS/TACSAT/MUOS
BN S2/S3 OPS
BDE S1/S4 OPS and Subordinate
SINCGARS/TACSAT/MUOS
BN S1/S4 OPS
BDE FIRES and Subordinate BN
SINCGARS/TACSAT/MUOS
FIRES OPS
Coordinate ARTY FDC, to
SINCGARS
Howitzers
All FOs, TACP, USAF CAS, FSO to
UHF (LOS)
coordinate air support (fast
movers)
SINCGARS
Coordinate Medical Evacuation
BDE Mid-Tier
SATCOM Network to support JBCL Band SATCOM
P mobile users
BDE Staff provides high speed
WNW
MANET for IP voice, data
N12
Version 0.4 10 June 2013
BN Upper Tier (BSTB, INF, RSTA, FA, BSB)
Connect to the GIG
WIN-T
BN CMD
BN O&I
BN ADLOG
BN FIRES
BN FIRES
Direction
BFT 2
BN Tier 2 Data
WIN-T
BFT 2
BN Tier 2 Data
HHC SRW (S)
CO SRW (S)
*PLT SRW (S)
PLT SRW
(UNCLASS)
Communication Network to the
GIG supporting Voice, Data, Video
TCN, PoP, SNE
and network services at a TOC and
OTM CDR vehicles
BN CNR Nets (BSTB, INF, RSTA, FA, BSB)
Monitored by all Companies
SINCGARS/TACSAT/MUOS
BN CDR and Subordinate CDRs
BN S2/S3 Staff & CO’s coordinate
SINCGARS/TACSAT/MUOS
operations and intelligence
BN S1/S4 Staff & CO’s coordinate
SINCGARS/TACSAT/MUOS
HR and Supply
BN FSO, BN FSE, CO FSO, BN
SINCGARS/TACSAT/MUOS
Mortars, Follow on ARTY, ATK
AVN coordinate fires
BN FSC, BN FSO, BN Mortars
SINCGARS
BN Mid-Tier (BSTB, INF, RSTA, FA, BSB)
SATCOM Network to support JBCL Band SATCOM
P mobile users
BN Staff, CO HQ provides high
WNW
speed MANET for IP voice, data &
video
Company Upper Tier (BSTB, INF, RSTA, FA, BSB)
Connect to the GIG
Communication Network to the
GIG supporting Voice, Data, Video
SNE
and network services on OTM CDR
Vehicles
Company Mid-Tier (BSTB, INF, RSTA, FA, BSB)
SATCOM Network to support JBCL Band SATCOM
P mobile users
BN Staff, CO HQ provides high
WNW
speed MANET for IP voice, data &
video
Company Lower Tier (BSTB, INF, RSTA, FA, BSB)
Voice Call Groups, Data, PLI
HHC Staff Voice, Data PLI supports
SRW
(Net Warrior)
CO LDRs and Staff CO, 1SG,
SRW
PL,PSG, FSO support voice, data
PLI (Nett Warrior)
PL, PSG, SQUAD LDR, TM LDR
SRW
FO, support voice, data, PLI (Nett
Warrior)
SQUAD LDRs, TM LDRs, and
SRW
Teams support voice and PLI
N10 ITNE Networks and Services
N13
Version 0.4 10 June 2013
3.6 Phases of the Operate:
3.6.1 Phase 1 Moving from the assembly area to the line of departure (LD). The
tactical situation and the order in which the commander wants his subordinate units to
arrive at their attack positions govern the march formation.
ITNE: During planning process before moving to LD all network configurations must be
completed and tested (Radios, Mission Command Apps, Frequencies, COMSEC, IP
Schema, Presets, Call Groups, and Hop Sets). 1 CAB is transferring OPCON control of
A Company over to 2 CAB for the Frontal maneuver all gateway and Mission Command
App changes must be completed before entering Phase 1
BDE
CMD/O&I/AL
BDE
NETS BDE
BN
CMD/O&I/AL
BDE
NETS BDE
WIN-T
NCW
TAC-P
MUOS or
SINCGARS
NOC
JBC-P
MUOS or SINCGARS
MUOS or SINCGARS
MUOS or SINCGARS
FIRES
BFT
NETS
NETS
NETS
NETS
MUOS or SINCGARS
MUOS or SINCGARS
UHF/VHF/TACSAT
MEDVAC
MUOS or SINCGARS
Phase 1
Legend
Line of Departure LD
Phase Line
PL
Enemy
WNW
SRW
I
I
A/RSTA
I
I
B/CAB 1
C/CAB 1
II
CAB 1
X
II
I
I
I
B/CAB 2
A/CAB 2
BCT TAC
C/CAB 2
I
CAB 2
B/FA
A/FA
LD
B/RSTA
I
I
ACAB 1
X
BCT TOC
II
RSTA
II
FA
II
II
BSTB
BSB
Figure N11 Phase 1 Move to Line of Departure
N14
Version 0.4 10 June 2013
3.6.2 Phase 2 Maneuvering from the line of departure to the probable line of
deployment (PLD). Units move rapidly through their attack positions and across the
LD, which should be controlled by friendly forces. The commander considers the
mission, enemy, terrain and weather, troops and support available, time available, and
civil considerations (METT-TC) when choosing the combat formation that best balances
firepower, tempo, security, and control.
Intelligence report has identified small pockets of enemy forces in both New Jersey and
New York Axis’s. Recon companies will scout forward and determine size of enemy
force. Mission Command Apps (JBC-P & Nett Warrior) devices working off Mid Tier and
Lower Tier networks start updating with Recon SA on enemy positions. Leaders
develop COP and determine attack plans.
BDE
CMD/O&I/AL
BDE
NETS BDE
BN
CMD/O&I/AL
BDE
NETS BDE
WIN-T
NCW
TAC-P
MUOS or
SINCGARS
NOC
JBC-P
MUOS or SINCGARS
MUOS or SINCGARS
MUOS or SINCGARS
FIRES
BFT
NETS
NETS
NETS
NETS
MUOS or SINCGARS
MUOS or SINCGARS
UHF/VHF/TACSAT
MEDVAC
MUOS or SINCGARS
Phase 2
Legend
Line of Departure LD
Phase Line
I
PL
B/RSTA
I
Enemy
WNW
A/RSTA
I
I
SRW
I
A/CAB 2
B/CAB 1
I
B/CAB 2
C/CAB 2
I
C/CAB 1
X
II
I
BCT TAC
CAB 1
ACAB 1
I
I
A/FA
B/FA
II
LD
II
RSTA
CAB 2
X
II
BCT TOC
II
II
FA
BSB
BSTB
Figure N12 Phase 2 Probable Line of Deployment
N15
Version 0.4 10 June 2013
3.6.3 Phase 3 Actions at the PLD: The attacking unit splits into one or more assault
and support forces as it reaches the PLD, if not already accomplished. All forces
supporting the assault should be set in their support by fire position before the assault
force crosses the LD. The assault force maneuvers against or around the enemy to take
advantage of the support force’s efforts to suppress targeted enemy positions.
With the use of Mission Command Apps (JBC-P and Nett Warrior) IBCT was able to
coordinate Fires batteries and destroy enemy position on the PLD.
BDE
CMD/O&I/AL
BDE
NETS BDE
BN
CMD/O&I/AL
BDE
NETS BDE
WIN-T
NCW
TAC-P
MUOS or
SINCGARS
NOC
JBC-P
MUOS or SINCGARS
MUOS or SINCGARS
MUOS or SINCGARS
FIRES
BFT
NETS
NETS
NETS
NETS
MUOS or SINCGARS
MUOS or SINCGARS
UHF/VHF/TACSAT
MEDVAC
MUOS or SINCGARS
Phase 3
I
I
B/RSTA
A/RSTA
Legend
Line of Departure LD
Phase Line
PL
I
X
X
I
X
I
A/CAB 2
B/CAB 1
I
Enemy
I
C/CAB 2
B/CAB 2
I
C/CAB 1
X
ACAB 1
BCT TAC
II
WNW
CAB 1
II
II
RSTA
CAB 2
SRW
I
I
LD
B/FA
A/FA
II
X
BSB
BCT TOC
II
II
FA
BSTB
Figure N13 Phase 3 Action at Probable Line of Deployment
N16
Version 0.4 10 June 2013
3.6.4 Phase 4 Assaulting the Objective: The commander employs all means of fire
support to destroy and suppress the enemy, and sustain the momentum of the attack.
Attacking units move as quickly as possible onto and through the objective. Depending
on the size and preparation of enemy forces, it may be necessary to isolate and destroy
portions of the enemy in sequence.
Fires BNs will move up to range of objective targets and IBCT units move to positions to
support attack on OBJ Giant & Jets. Recon teams will scout weakness and report
SITREPS on Mission Command Apps (JBC-P and Nett Warrior). Leaders will maintain
COP and SA throughout the Phase.
BDE
CMD/O&I/AL
BDE
NETS BDE
BN
CMD/O&I/AL
BDE
NETS BDE
FIRES
BFT
NETS
NETS
NETS
NETS
TAC-P
MUOS or
SINCGARS
NOC
JBC-P
MUOS or SINCGARS
MUOS or SINCGARS
MUOS or SINCGARS
MUOS or SINCGARS
UHF/VHF/TACSAT
WIN-T
NCW
MEDVAC
MUOS or SINCGARS
MUOS or SINCGARS
Phase 4
X
X
I
I
B/CAB 1
X
X
I
A/RSTA
I
C/CAB 1
Phase Line
PL
II
I
X
CAB 1
B/RSTA
A/CAB 2
I
X
X
I
B/CAB 2
I
Legend
Line of Departure LD
ACAB 1
BCT TAC
A/FA
C/CAB 2
I
II
I
II
X
CAB 2
B/FA
RSTA
Enemy
II
WNW
SRW
FA
X
BCT TOC
II
BSTB
II
BSB
LD
Figure N14 Phase 4 Assaulting the Objective
N17
Version 0.4 10 June 2013
3.6.5 Phase 5 Consolidating on the Objective. Immediately after a successful
assault, the attacking unit seeks to exploit its success. It may be necessary, though, to
consolidate its gains. Consolidation can vary from repositioning force and security
elements on the objective, to a reorganization of the attacking force, to the organization
and detailed improvement of the position for defense.
BDE
CMD/O&I/AL
BDE
NETS BDE
BN
CMD/O&I/AL
BDE
NETS BDE
WIN-T
NCW
TAC-P
MUOS or
SINCGARS
NOC
JBC-P
MUOS or SINCGARS
MUOS or SINCGARS
MUOS or SINCGARS
FIRES
BFT
NETS
NETS
NETS
NETS
MUOS or SINCGARS
MUOS or SINCGARS
UHF/VHF/TACSAT
MEDVAC
MUOS or SINCGARS
I
I
I
ACAB 1
A/RSTA
Phase 5
I
A/CAB 2
B/CAB 1 I
B/RSTA
I
I
I
C/CAB 2
B/FA
A/FA
II
X
II
CAB 2
BCT TAC
CAB 1
II
II
RSTA
FA
X
X
I
C/CAB 1
I
X
B/CAB 2
BCT TOC
II
Legend
BSTB
Line of Departure LD
Phase Line
PL
X
II
BSB
X
X
Enemy
WNW
SRW
LD
Figure N15 Phase 5 Consolidating on the Objective
3.6.6 Phase 6 Transition: After seizing the objective, the unit transitions to some other
type of military operation. This operation could be the exploitation or pursuit, or perhaps
a defense. Transitions (through branches and sequels) are addressed and planned prior
to the offensive operation being undertaken.
N18
Version 0.4 10 June 2013
Appendix O
(Capability Set 13 UTR Detailed Technical Procedures (DTPs))
1.0 Summary: This Appendix covers the DTPs associated with Capability Set 13 unit
task reorganization (UTR). These DTPs deal with the movement of a pure Army
platoon within the same maneuver battalion and a pure company within the same BCT.
The force design for the units involved in this UTR is the modified CS 13 Infantry
Brigade Combat Team (IBCT) Design.
2.0 Movement of a Pure Platoon in the CS 13 Modified IBCT Design DTP: The task
organization of a pure infantry platoon across companies within the same battalion is a
UTR Category 2C3. As stated in Appendix K, a UTR CAT2C3 includes only ITNE
systems (no UTI), terrestrial operational tier systems only, and only basic task
organization mission (BTOM) (i.e. pure fleeted unit). At the platoon level, the primary
ITNE tiers affected are only the lower tier waveforms and radio platforms as specified in
the ITNE CONOPS. This DTP deals only with the Soldier Radio Waveform (SRW)
network.
2.1 DTP for the SRW Network (Platoon transfer between Companies within the
same battalion): The following DTP should be applied after receiving orders for a
platoon to be OPCON to another Company within the same battalion. The S-6 must
ensure the Platoon knows which Presets are currently programmed on their radios.
2.2 Procedure Summary: The following steps are to be followed to properly plan for
and execute the UTR for the selected platoon. These steps are required when utilizing
the J-TNT and only include the Network Design Phase and Load/Verification Phase of
the ITNE Planning Process. The first three phases are already complete and the S-6 is
utilizing the pre-planned NP, ND, and MCF stored in the assigned presets to execute
this UTR.
2.3 Procedure:
2.3.1: Identify if the gaining company’s CMD Net is a preset set in the PLT Leader / PLT
SGT Classified Radios. No reprogramming should take place if the gaining Company’s
presets have been configured on the PLT LDR / PLT SGT Radios. This task is
accomplished by setting the radio to the gaining company’s preset. If the preset is not
in the radio, proceed to the next step.
2.3.2: Program the PLT Leader / PLT SGT Classified Radios using the JENM tool.
Ensure that the newly programmed preset has a Node ID that is unique in the gaining
unit’s CMD NET. Do not reprogram unclassified radios operating on PLT CMD
NET.
2.3.3: If the Radio being programmed has no presets available, write over least mission
critical presets that are currently stored - Update the Radio Mission Data Set (RMDS)
and preset spreadsheet with the changes made to the radio.
2.3.4: Conduct radio checks on newly programmed presets as well as Company CMD
NET on original preset. Platoon should remain on original Company CMD NET until in
the SRW range of the gaining company; communicate via BFT or other means when
outside of SRW range.
2.3.5: Program original presets upon return to organic company.
3.0 Movement of a pure company in the CS 13 Modified IBCT Design DTP: The
O1
Version 0.4 10 June 2013
task organization of a pure infantry company across battalions within the same BCT is a
UTR Category 1C3. As stated in Appendix K, a UTR CAT1C3 includes UTI and ITNE
systems, terrestrial operational tier systems only, and only basic task organization
mission (BTOM) (i.e. pure fleeted unit). At the company level, the primary ITNE tiers
affected are the lower and mid tier waveforms and radio platforms as specified in the
ITNE CONOPS. This DTP deals with the Adaptive Networking Wideband Waveform
(ANW2) and the Soldier Radio Waveform (SRW) networks.
3.1 DTP for the ANW2 Network (Company transfer between battalions within the
same BCT): The following DTP should be applied after receiving orders for a company
to be OPCON to another battalion within the same BCT. The S-6 must ensure the
Platoon knows which Presets are currently programmed on their radios and which
Command Nets on which they can talk. The PLT Leader / PLT SGT / FDO Classified
Radios are preset with.
3.2. Procedure Summary: Each Brigade will receive a FRAGO that contains all of the
data for the UTR. The configuration files for the ANW2 networks are included in this
package. They are the “*.hcpa” files used by the J-TNT which houses the Harris CPA
Tool. The HCPA files contain all the data you will need to reconfigure radios to join other
ANW2 networks. In addition any person performing the reconfiguration must have
attended J-TNT Net training or be proficient in the use of the Harris CPA tool v1.4.1.26
+ Harris Falcon III CPA v1998 add-on.
3.3 Procedure:
3.3.1: Obtain the HCPA file for both battalion networks.
3.3.2: For each radio being moved collect the following information from the losing
unit’s HCPA file (Example: 2-87BN_ANW2_NET.hcpa).
Name:
(example:
CDR1A287X1214810); Description: (example: RCDR1-11766-A-2BN87IN); Notes:
(example: 2BN87IN SNE CDR); Red Ethernet Address: (example: 22.208.2.41); Red
Ethernet Netmask: (example: 255.255.255.252)
3.3.3: Open the gaining unit HCPA file (Example: 1-32BN_ANW2_NET.hcpa). Check
for available IP addresses and assign a new IP address for each radio being moved.
Click on any radio in the gaining Battalion’s ANW2 NET topology file and look at the
following fields: Red INE Address; Red INE Mask; Lookup SNMP information from Row
35-37 in the Figure O1 below; Determine the Red INE subnet range (use an IP
calculator if available); assign an IP address for each radio being added to the Red INE
Address field; Ensure the IP address is not being used by an existing radio; check the
current assigned IP addresses by opening the Peer Enclave Prefix (PEP) Table and
select IP addresses from the Red INE subnet that are not present; <add navigation to
PEP>; red INE Mask will stay the same for each radio.
3.3.4: The following information for every radio that is being moved into the Battalion
Net File. These include: Name; Description; Notes; Red Ethernet Address; Red
Ethernet Netmask; Red INE Address; Red INE Mask.
3.3.5: Perform the following for each radio being added: From the tool bar on the left,
drag and drop a new AN/PRC-117G. Then click on the Expand All button in the
Properties window. Ensure this radio is highlighted. Press the Control (CTRL) button
and click the ANW2C cloud. Then click the Connect button. Configure each radio to
match these settings for the ANW2 Global settings for Cloud: Item 5. Always set to
5000KHz. Increased bandwidth will support faster data pass through; Item 6. Slot and
O2
Version 0.4 10 June 2013
Month must always match. (example; Dec would be Slot 012, Jan-01); Item 7. Key
Chain Configuration is always BATON; Item 8. For CS-13, guidance is for “No Voice”.
To Activate “Voice”, Hops must be set to one number from 1-9; Items 9-26 (Station,
Global). Every Radio Node is set to the default settings (bolded); Items 27-37
(Individual, Global); Item 32 Red INE Mode always set to MANUAL; Item 35, SNMP
User Table. Use the following Default settings: Name: USER001; AuthType: SHA1;
Auth String: hello123; Privacy Encryption Type: AES; Privacy Encryption Key:
hello123.
O3
Version 0.4 10 June 2013
Item
Description
ANW2 Global
1.
Name
2.
Black Subnet
3.
Black Mask
4.
Frequency
5.
Bandwidth
6.
Key Chain Config.
7.
8.
Details
Key Chain Config.
No Voice – For CS-13.
No periods or slashes, only underlines
Set Black Subnet. Network Information/Preset
Set Black Netmask
Set Frequency in MHz. Network Information/Preset/General
Bandwidth = 5000KHz. Network Information/Preset/General
Global Key Chain Configuration, Key Chain 1, For each
Monthly slot, choose the corresponding TEK key. For
example.; slot DEC 2012, choose TEK012, for July 2013
choose TEK007.
Configure BATON Key.
//Network
Information/Presets/General/Epoch/Configuration/Digital
Voice Relay [hops] set to ‘zero’. This disables voice.
Station Global
9.
HAIPE Dynamic Discovery
10.
Default SPD Setting
11.
12.
13.
14.
HAIPE Dynamic PEPT
HAIPE PDUN
HAIPE PDUN static
Admin Routing Cost
15.
16.
SNMP
Red ICMP Processing
17.
18.
Red Ping Processing
RIP
19.
20.
21.
RIP, Advertise Default
RIP, SA Reach ability
RIP, SA Reach ability
Metric Mode
22. RIP Interface, Ethernet
23. RIP Interface, Ethernet Mode
24. RIP Interface, Ethernet Metric
25. RIP Interface, INE
26. RIP Interface, INE Metric
Station, Individual
27. Name
28. Description
29. Notes
ENABLE dynamic discovery, ensure valid/correct key chain,
don’t change MC address, and don’t put address in MC table.
ENABLE Baton DISABLE Medley. From
/HAIPE/advanced/Default
SPD Settings/Encryption
ENABLE Dynamic PEPT from / HAIPE
ENABLE PDUN
ENABLE PDUN static
Ensure the following set in /Red IP Networking/Red Routes;
Static admin cost = 30; RIP admin cost=20; OSPF Admin
cost = 10
Set Configure SNMP to ENABLED
Set Red ICMP Processing to ENABLED/Station
Configuration/Red IP Networking
Set Red Ping Processing to ENABLED.
ENABLERIP;/Station Configuration/ Red IP
Networking/Routing Information Protocol
Set Advertise Default to ALLOW
Set SA Reach ability to ENABLED
Set SA reach ability metric to AUTO
Set Ethernet to ENABLED
Set Ethernet Mode to RX and TX
Set Ethernet metric to 1
Set INE to ENABLED
Set INE Metric to 1
Set Name using data obtained from old plan
Obtained from old plan (optional)
Obtained from old plan (Optional)
Figure O1
O4