top - download
⟦4bf65e6c0⟧ Wang Wps File
Length: 24605 (0x601d)
Types: Wang Wps File
Notes: LKSAA - indholdsforteg.
Names: »4250A «
Derivation
└─⟦37660ca85⟧ Bits:30006030 8" Wang WCS floppy, CR 0386A
└─ ⟦this⟧ »4250A «
WangText
Issue
1.5
LKSAA
- VOLUME
II
SYS/84-06-15
TECHNICAL
PROPOSAL
Page
#a
Part 1
1 INTRODUCTION .....................................
13
1.1 DECISION TO BID LKSAA ........................
13
2 COMPUTER SYSTEM ..................................
24
2.1 HARDWARE .....................................
26
2.1.1 Introduction .............................
26
2.1.2 X-NET, Local Area Network (optional) .....
28a
2.1.2.1 General Description of X-Net .........
28a
2.1.2.2 Basic Implementation of the optional
Local Area Network ...................
31
2.1.2.3 Extension Capabilities of the Local
Area Network .........................
32
2.1.2.4 Utilization of another Local Area
Network ..............................
34
2.1.3 Central Communication System .............
35
2.1.3.1 General Description ..................
35
2.1.3.2 LKSAA Processor and Channel Units
(Basic Implementation) ..............
46
2.1.3.3 Extension Capabilities ...............
55
2.1.4 Equipment Matrix for the Computing
System ..................................
56
2.1.5 System Capacity and Connectivity
of Computer System ......................
58
2.1.5.1 Local Area Network (Option) .........
58
2.1.5.2 Central Communication System ........
58
2.2 SOFTWARE .....................................
66
2.2.1 System Software .........................
66
2.2.1.1 Standard Operating System ...........
66
2.2.1.2 General Maintenance Software ........
100
2.2.2 General Development and Maintenance
Software .................................
101
2.2.2.1 Programming Languages ................
101
2.2.2.2 Utility Software .....................
101
2.2.2.3 Binder ...............................
102
2.2.2.4 Test Tools ...........................
102
2.2.3 Highlevel Operating System (HIOS) ........
103
2.2.4 Security System .........................
105
2.2.4.1 Access Control .......................
105
2.2.4.2 Error Processing .....................
105
2.2.4.3 Checkpoint, Recovery and Restart .....
107
2.2.5 Application Software .....................
117
2.2.5.1 Message Correction Programs ..........
123
2.2.5.2 Message Processing ...................
123
2.2.5.3 Network Management ...................
124
2.2.5.4 Log ..................................
124
2.2.5.5 Statistics ...........................
124
2.2.6 Diagnostic Programs ......................
125
2.2.6.1 Off-Line Diagnostic Program ..........
125
2.2.6.2 On-Line Diagnostic Programs ..........
125
2.3 AVAILABILITY REQUIREMENTS ....................
126
2.3.1 General Considerations ...................
126
2.3.2 Recovery Procedures ......................
128
2.3.3 Fallback Procedures ......................
129
2.3.4 Recovery Times ...........................
130
2.3.5 Overall System Availability ..............
130
2.3.6 Mean-Time-Between-Failure (MTBF) .........
133
2.3.7 Mean-Time-To-Repair (MTTR) ...............
136
2.4 INSTALLATION .................................
140
2.4.1 FMZ Installations ........................
140
2.4.2 Radio Control System......................
141a
2.4.2.1 Radio Control Center .................
141a
2.4.2.2 TX Station ...........................
141a
2.4.2.1 RX Station ...........................
141b
2.4.3 AE - Installations (option) ..............
141b
2.4.4 Typical Layout ...........................
141b
2.4.5 Installation and Cabling Requirements ....
153
2.4.5.1 General ..............................
153
2.4.5.2 FMZ Rooms ............................
153
2.4.5.3 Cable Routing to AE-Workstations .....
154b
2.4.5.4 AE Workstations or Cells (Option) ....
154b
2.4.5.5 Radio Control Centre .................
154b
2.4.6 Physical Location of the Equipment in
the FMZ ..................................
154c
2.5 DOCUMENTATION ................................
155
2.5.1 Documentation Requirement Analysis .......
155
2.5.1.1 General Requirements .................
155
2.5.1.2 Program Documentation Requirements ...
155
2.5.1.3 Work Procedures Requirements .........
156
2.5.1.4 Operational Procedures Requirements
157
2.5.2 Documentation Proposal ...................
157
2.6 METHODS AND TOOLS ............................
159
2.6.1 System Design and Hardware Configuration
. 159
2.6.2 Software Design, Development
and Integration ..........................
159
2.6.2.1 Development Method ...................
159
2.6.2.2 Software Package Design ..............
171
2.6.2.3 Software Modularity ..................
173
2.6.2.4 Structure of the PDS .................
177
2.6.2.5 Package Design Standard ..............
182
2.6.3 Configuration Control ....................
186
2.6.4 Project Management .......................
186
2.7 SECURITY ...................................
187
2.7.1 Security Assurance Via Hardware ..........
187
2.7.1.1 Principal Hardware Architecture ......
187
2.7.1.2 Memory Mapping .......................
188
2.7.1.3 CPU States ...........................
190
2.7.1.4 Monitor Instruction ..................
191
2.7.1.5 Interrupts ...........................
192
2.7.1.6 Integrity Checks .....................
197
2.7.1.7 Configuration Control ................
197
2.7.2 Security Assurance via Software ..........
198
2.7.2.1 Summary ..............................
198
2.7.2.2 Terminal Security ....................
199
2.7.2.3 Security Audit .......................
208
2.7.2.4 Security Administration...............
210
2.7.3 Security Assurance of the
Integrated System ........................
213
2.7.3.1 Summary ..............................
213
2.7.3.2 Systems Architecture .................
216
2.7.3.3 Covert Channel Analysis ..............
246
2.7.3.4 Mapping Security .....................
248
3 TERMINAL EQUIPMENT IN COMMUNICATIONS CENTRE ......
250
3.1 CONFIGURATION ................................
250
3.2 TERMINAL EQUIPMENT ...........................
251
3.2.1 Optical Character Reader .................
251
3.2.2 Papertape Reader .........................
257
3.2.3 Papertape Punch ..........................
257
3.2.4 Printing Systems .........................
258
3.2.4.1 Fast Line Printer ....................
258
3.2.4.2 Document Printing System .............
258
3.2.5 Telex Station ............................
259
3.2.6 Teletex Station ..........................
259
3.2.7 Visual Display Unit (VDU) ................
259
3.2.8 Printer ..................................
261
3.3 MESSAGE REGISTRATION OPERATOR ................
261
3.4 MONITORING AND CONTROL OPERATORS .............
262
3.4.1 System Supervisor ........................
263
3.4.2 Message Distribution Operator ............
263
3.4.3 System Supervisor(2) .....................
263
3.4.3.1 Colour Graphic Display Functions .....
263a
3.4.3.2 Printer Functions ....................
263b
3.4.4 Security Log .............................
264
3.4.5 Situation Monitors .......................
264
3.5 MESSAGE SERVICE OPERATORS ....................
264a
3.6 RADIO CONTROL SYSTEM .........................
264a
3.6.1 Introduction .............................
264a
3.6.2 General Description ......................
264a
3.6.2.1 Interface to Central Communication
System (ZVA)..........................
264d
3.6.2.2 Processing In Radio Control System ...
264d
3.6.2.3 Back Up Facilities ...................
264d
3.6.3 Radio Control Center .....................
264e
3.6.3.1 General ..............................
264e
3.6.3.1.1 Link Set-up and Control of
Message Transfer .................
264f
3.6.3.1.2 Manual Set-up of Radio Links .....
264h
3.6.3.1.3 Automatic Set-up of Radio Links ..
264h
3.6.3.1.4 Message Transfer .................
264h
3.6.3.2 Operator Positions ...................
264i
3.6.3.2.1 Equipment at Operator Position ...
264i
3.6.3.2.2 VDU Functions (Common Functions)
. 264j
3.6.3.2.3 Special Operator Positions .......
264k
3.6.3.2.3.1 Supervisor Position ..........
264k
3.6.3.2.3.2 Voice ........................
264l
3.6.3.3 Racks ................................
264l
3.6.3.4 Log Printer ..........................
264l
3.6.3.5 Teletype For Radiodialogue ...........
264m
3.6.3.6 Back-up Facilities ...................
264m
3.6.4 Receiver Station .........................
264n
3.6.5 Transmitter Station ......................
264p
3.6.6 Installation .............................
264r
3.6.6.1 General ..............................
264r
3.6.6.2 Radio Control Center .................
264r
3.6.6.3 Transmitter Sites ....................
2644
3.6.6.4 Receiver Sites .......................
264s
3.6.6.5 Site Preparation .....................
264s
3.6.7 Transportation ...........................
264s
3.6.8 Maintenance ..............................
264t
3.6.8.1 General ..............................
264t
3.6.8.2 On Site Maintenance ..................
264t
3.6.9 Spare Parts ..............................
264t
3.6.10 Documentation ..........................
264t
3.6.11 Training ...............................
265
3.7 CRYPTO SUPERVISOR ............................
265a
3.8 NET SUPERVISOR ...............................
265b
3.9 LINE SWITCHING FACILITY ......................
265b
3.9.1 Physical Line Switching and Patching
Facility .................................
265b
3.9.2 Electronic Line Switching and Patching
Facility .................................
265e
4. TERMINAL EQUIPMENT IN OFFICES .................
267
4.1 CURRENT WORD PROCESSING SYSTEMS .............
268
4.2 WORD PROCESSING SYSTEMS .....................
269
4.3 INTELLIGENT OFFICE SYSTEMS ..................
270
4.4 OPERATION CENTRES ...........................
271a
4.4.1 Duty
Centre
.............................
271a
4.4.2 Situation
Centre
........................
271a
4.5 TEMPEST TELETEX STATION .....................
271b
4.6 BASIC EQUIPMENT .............................
271b
5 REMOTE CONNECTIONS ...............................
273
6 CRYPTO SYSTEM ....................................
275a
6.1 CRYPTO SYSTEM HARDWARE .......................
275a
6.1.1 System
Interface
to
Off-Line
Crypto-
graphic
Equipment
........................
277
6.1.2 Interface
to
On-Line
Crypto
..............
277
6.2 CRYPTO SYSTEM SOFTWARE .......................
277
6.2.1 Crypto
Key
Management
....................
278
6.2.1.1 Input
of
Crypto
Keys
.................
278
6.2.1.2 Management
of
Crypto
Keys
............
278
6.2.1.3 Initiation
of
Crypto
Keys
............
279
6.2.2 Management
of
The
OFFLINE
Crypto
Device
..
279
6.2.3 Management
of
ONLINE
Crypto
Devices
......
280a
6.3 CRYPTO KEY SUPERVISION .......................
280b
6.4 CRYPTO SECURITY ..............................
280b
6.5 CRYPTO RACKS .................................
280b
6.5.1 Racks
for
Off-Line
Cryptos
...............
280b
6.5.2 Racks
for
On-Line
Cryptos
................
280c
7 PROJECT ISSUES ...................................
283
7.1 PROJECT IMPLEMENTATION PLAN ..................
283
7.2 PROJECT MANAGEMENT AND CONTROL ...............
285
7.3 QUALITY ASSURANCE ............................
293
7.3.1 Parts and Material (P&M) .................
294
7.3.2 Reliability ..............................
294
7.3.3 Quality Control (QC) .....................
294
7.3.4 QA-Policy ................................
295
7.3.5 QA System ................................
295
7.4 DETAILED REQUIREMENTS ........................
296
7.5 DESIGN .......................................
296
7.5.1 Preliminary Design .......................
298
7.5.2 Detailed Design Baseline .................
299
7.5.3 Code and Unit Test Baseline ..............
300
7.5.4 Subsystem Integration and Test Baseline ..
300
7.6 IMPLEMENTATION ...............................
303
7.7 ASSEMBLY AND FACTORY TEST ....................
303
7.7.1 Factory Testing of Hardware ..............
303
7.7.1.1 Incoming Inspection Tests ............
303
7.7.1.2 Hardware System Tests ................
304
7.7.2 Factory Testing of Software ..............
305
7.7.2.1 Unit Testing .........................
305
7.7.2.2 Package Integration and Test .........
307
7.7.2.3 Development Test Evaluation ..........
307
7.7.2.4 System Integration and Test ..........
307
7.8 INSTALLATION ...............................
309
7.8.1 Requirement Analysis .....................
309
7.8.2 Installation Planning ....................
310
7.8.3 Equipment Installation Data ..............
310
7.8.4 Site Survey ..............................
311
7.8.5 Site Preparation Requirements ............
311
7.8.6 Equipment Installation Drawings ..........
312
7.8.7 Site Readiness Verification ..............
312
7.8.8 Transportation ..........................
313
7.8.9 Site Installation ........................
314
7.9 TRAINING .....................................
315
7.9.1 Instruction ..............................
315
7.9.2 Training .................................
315
7.9.3 Training Program Plan ....................
315
7.9.4 Optional Training Courses ................
316
7.9.5 Training Documentation ...................
316
7.10 OPERATIONAL TESTS ..........................
317
7.10.1 Purpose of the Operational Test.........
317
7.10.2 Functional Description .................
317
7.11 ACCEPTANCE TEST ............................
317
7.12 WARRANTY AND MAINTENANCE ...................
320
7.12.1 General .................................
320
7.12.2 Maintenance Planning ...................
320
7.12.3 Maintenance Plan .......................
320
7.12.4 Maintenance Activities .................
323a
7.12.4.1 Preventive Maintenance .............
323a
7.12.4.2 Emergency Maintenance ..............
323a
7.12.4.3 Software Maintenance ...............
323b
7.12.5 Field Support ..........................
324
7.12.6 Spare Parts ............................
324
7.12.7 Tools and Test Equipment ...............
325
7.12.8 Consumables ............................
325
7.12.9 Repair .................................
325
7.12.10 Customer Support .......................
325
7.12.11 Equipment Serviced .....................
325
Part 2
1 INCOMING MESSAGE PROCESSING ......................
337
1.1 MESSAGE RECEPTION ............................
338
1.1.1 Incoming Channels ........................
338
1.1.2 Message Reception Procedures .............
338
1.1.2.1 Message Reception ....................
338
1.1.2.2 Message Validation ...................
339
1.2 \REGISTRATION ................................
340
1.3 AUTOMATIC HEADER ANALYSIS ....................
340
1.3.1 Interpretation of the Message Format .....
341
1.3.2 Message Header Data ......................
341
1.3.2.1 Automatic Message Header Analysis ....
341
1.3.2.2 Message Correction ...................
341
1.3.2.3 Message Service Operator (MSO) .......
342
1.3.3 Message Header for "Fremdformat" .........
349
1.3.4 Service Messages .........................
349
1.4 AUTOMATIC MESSAGE PROCESSING .................
350
1.4.1 Validation of Channel-Serial-Number ......
350
1.4.2 Priority Levels ..........................
350
1.4.3 Start at Offline Decryption ..............
351
1.4.3.1 Analysis of Encryption Control Data ..
351
1.4.3.2 On-Line Decryption ...................
351
1.4.3.3 Off-Line Decryption ..................
351
1.4.4 Messages for Off-Line Processing .........
351
1.5 TEST, TRANSFER AND CORRECTION ................
352
1.5.1 Prerequisites ............................
352
1.5.2 Message Validation .......................
352
1.5.3 Message Transfer and Correction ..........
356
1.5.3.1 Correction of Message in "Fremdformat
356
1.5.3.2 Correction of Decrypted Messages .....
357
1.5.4 Request for Repetition ...................
357
1.5.5 Cancellation of Correction ...............
358
1.6 SUBJECT CODING AND REDIRECTION ...............
358
1.6.1 General ..................................
358
1.6.2 Automatic Distribution ..................
360
1.6.3 Message Distribution Operator (MDCO) .....
360
1.6.4 Redirection ..............................
362
1.7 SECURITY PROCESSING ..........................
362
1.7.1 Security Classifications from Restricted
to Secret ................................
363
1.7.2 Top Secret Messages ......................
363
1.7.3 NATO - Classified Messages ...............
364a
1.7.4 Unauthorized Access to the System ........
364a
1.8 MESSAGE ACKNOWLEGEMENT .......................
364b
1.9 MESSAGE STORAGE AND RETRIEVAL ................
364b
2 OUTGOING MESSAGE PROCESSING .....................
369
2.1 INJECTION OF MESSAGES .......................
369
2.2 STORAGE .....................................
369
2.3 HEADER AND TEXT CONTROL .....................
371
2.3.1 Message Preparation .....................
371
2.3.2 Message Validation ......................
377
2.3.3 Message Queues ..........................
377
2.3.4 Message Release .........................
378
2.4 AUTOMATIC PROCESSING ........................
379
2.4.1 Logging .................................
379
2.4.2 General Comments on Message Processing ..
379
2.4.2.1 Priority ............................
379
2.4.2.2 Addressing Receivers ................
379
2.4.2.3 Messages in Plain Text ..............
380
2.4.2.4 Messages To Be Encrypted ............
380
2.4.3 Creation of Message Control Data ........
381
2.4.3.1 Message Synthesis ...................
381
2.4.3.2 Conversion Procedures ...............
381
2.4.3.3 Transmission Procedures .............
382
2.4.3.4 Message Routing .....................
383
2.4.4 Message Generation ......................
385
2.5 TRANSMISSION ................................
385
2.6 REDIRECTION .................................
386
2.7 REPETITION ..................................
386
2.8 CLASSIFIED MESSAGE PROCESSING ...............
387
2.9 ERROR PROCESSING ............................
387
3 SPECIAL POSITIONS ................................
389
3.1 EMERGENCY CENTRE ...........................
389
3.1.1 Incoming Messages ........................
389
3.1.2 Outgoing Messages ........................
389
3.1.3 Retrieval of Messages ....................
390
3.2 SITUATION CENTRE .............................
390
3.3 MESSAGE REGISTRATION AND SUPERVISION .........
390
3.4 RADIO LINK ...................................
391
3.4.1 Establishing Connection ..................
391
3.4.2 Processing through the ZVA ...............
392
4 DETAILED MESSAGE PROCESSING FUNCTIONS ............
396
4.0 VDU CHARACTERISTICS ..........................
396
4.0.1 VDU FACILITIES ...........................
396
4.0.2 VDU SCREEN LAYOUT ........................
397
4.0.2.1 VDU Header Area ......................
397
4.0.2.2 Format Area ..........................
401
4.0.2.3 Menus ................................
408
4.0.3 COMMANDS .................................
408
4.0.3.1 General Commands ....................
409
4.0.3.2 Format Edit ..........................
410
4.0.3.3 Field Edit ...........................
411
4.0.3.4 Screen Manipulation ..................
411
4.0.3.5 Transaction Processing ...............
412
4.0.4 Cursor Control ...........................
414
4.0.5 List of Commands .........................
415
4.0.5.1 Commands for USER: ...................
415
4.0.5.2 Commands for SUPERVISOR, MSO and MDCO:
416
4.1 KEYBOARD FUNCTIONS ...........................
419
4.1.1 Message Correction .......................
419
4.1.1.1 Retrieval ............................
419
4.1.1.2 Correction ...........................
420
4.1.1.3 Release ..............................
420
4.1.1.4 Not Accepted .........................
420
4.1.1.5 Character Correction .................
420
4.1.1.6 Generation of Message Header .........
421
4.1.1.7 Message Distribution .................
421
4.1.1.8 Message Rerun ........................
421
4.1.1.9 Messages on Papertape ................
421
4.1.1.10 Stop of Papertape Reader ...........
422
4.1.1.11 Input from VDU .....................
422
4.1.2 Network Change ...........................
422
4.1.2.1 Distribution .........................
423
4.1.2.2 Routing ..............................
423
4.1.2.3 Change of Message Routing ............
423
4.1.3 Network Monitoring and Control ..........
423
4.1.3.1 Processor Alarm .....................
423
4.1.3.2 Device Alarm ........................
424
4.1.3.3 Crypto Alarm ........................
424
4.1.3.4 Change of System Parameters .........
424
4.1.3.5 Status and Log ......................
425
4.1.4 Papertape Reader Control ................
426
4.2 STATISTIC FUNCTIONS .........................
426
4.2.1 Static Data .............................
426
4.2.2 Dynamic Data ............................
428
4.3 CRYPTO VERIFICATION .........................
428
4.4 RESPONSETIME REQUIREMENTS ...................
428
4.4.1 Specified Traffic Load ..................
429
4.4.2 Response Time ...........................
431
APPENDIX A - LKSAA TRAINING PROGRAM PLAN
1 APPENDIX B - LKSAA DOCUMENTATION PLAN
APPENDIX C - DATA SHEETS
APPENDIX D - LKSAA MAINTENANCE
ANNEX I - DESCRIPTION OF MAINTENANCE AND
CONDITIONS OF PROVISIONS OF MAINTENANCE
ANNEX II - RATES FOR OUT OF SCOPE WORK
ANNEX III - LIST OF SPARE PARTS
ANNEX IV - LIFE CYCLE COST FOR HARDWARE AND
SOFTWARE MAINTENANCE
ANNEX V - ALTERNATIVE MAINTENANCE PROPOSAL
APPENDIX E - BUNDESMINISTERIUM F…1f…R INNEN (BMI) Ressortnetz