top - download
⟦5c31e44e9⟧ Wang Wps File
Length: 17268 (0x4374)
Types: Wang Wps File
Notes: Spelunked
Names: »~ORPHAN76.08«
Derivation
└─⟦9bafbe04c⟧ Bits:30006092 8" Wang WCS floppy, CR 0144A
└─ ⟦this⟧ »~ORPHAN76.08«
WangText
DEFENSE DATA COMMUNICATIONS
1982-03-31
CHRISTIAN ROVSING A/S
Page #
III DEFENSE DATA COMMUNICATION
ENGAGEMENT AT CHRISTIAN ROVSING A/S
B. A NATIONAL STRATEGIC NETWORK - FIKS
A̲ ̲N̲A̲T̲I̲O̲N̲A̲L̲ ̲S̲T̲R̲A̲T̲E̲G̲I̲C̲ ̲N̲E̲T̲W̲O̲R̲K̲ ̲-̲ ̲F̲I̲K̲S̲
1. O̲B̲J̲E̲C̲T̲I̲V̲E̲ ̲
The obvjective of FIKS is to provide a fully integrated,
tri-service communications network for the army, the
navy, and the ir force of Denmark. FIKS must provide
rapid and reliable communication of adequate capoacity,
incorporating a high degree of security. Additionally,
FIKS must be expandable - in capacity and function
- so that new systems and future developmentsdo not
render FIKS obsolete for many years to come.
2. B̲E̲N̲E̲F̲I̲T̲S̲
FIKS meets all requirements for speed, capacity, security,
reliability and expandability.
It will be possible to deliver signals of the highest
priority to the correct address wthin 2 minutes. The
system can manage a traffic of 2500 incoming and 17,000
delivered signals per hour. The security provided
is so good that military messages of highest classification
may now be transferred by FIKS, and therefore messages
previusly sent by courier can be sent rapidly via FIKS
- all traffic will automatically be encrypted. Availability
will be ensured by fault-tolerant equipment dualization
and components of highest reliability. Finally, FIKS
has been planned from the sart to accomodate connection
to other networks. Via a secure gateway, FIKS can,
for example, be connected to NATO's automated teleprinter
network, NICS/TARE. Additionally, the data transfer
facility will accomodate integration with voice communiction
networks in the future.
In brief the advantages of the FIKS network are:
- More r̲e̲l̲i̲a̲b̲l̲e̲ communications through computer con-
trol, equipment dualization and system redundancy;
- Higher s̲u̲r̲v̲i̲v̲a̲b̲i̲l̲i̲t̲y̲ through multiple interconnec-
tions, lternative paths, and automatic rerouting;
- Improved s̲e̲c̲u̲r̲i̲t̲y̲ through message and data encryp-
tion and limited access;
- Greater e̲f̲f̲i̲c̲i̲e̲n̲c̲y̲, faster delivery and higher
throughput through real-time, multiplexed use of
ntwork facilities;
- Tighter c̲o̲n̲t̲r̲o̲l̲ through centralized computer coor-
dination, supervisor visibility, and automatic
col- lection of statistics and status information;
- Operational s̲i̲m̲p̲l̲i̲c̲i̲t̲y̲ through computer-aided message
preparation and enty, automatic distribution, and
minimum operator intervention;
- Easier e̲x̲p̲a̲n̲s̲i̲o̲n̲ through flexible, common and interchangeable
hardware/software modules.
3. S̲Y̲S̲T̲E̲M̲ ̲F̲U̲N̲C̲T̲I̲O̲N̲S̲
The FIKS network consists of up to 15 nodal switching
centers, interonnected by internodal trunk lines, ope-
rated at speeds up to 64 KBPS.
The network provides two types of services:
M̲e̲s̲s̲a̲g̲e̲ ̲S̲w̲i̲t̲c̲h̲i̲n̲g̲: Store and forward message switching
of military messages. Messages may be entered in the
ACP127 format or i a simplified format called SMF from
teleprinters or VDUs.
C̲i̲r̲c̲u̲i̲t̲ ̲S̲w̲i̲t̲c̲h̲i̲n̲g̲: Transparent transfer of data between
computers and terminals of any type and protocol.
The switching technique is based on a special packet
switching method which ensres rapid delivery with only
small variations. By this means the network is suited
for transfer of real time data like radar track data
and digital voice.
N̲E̲T̲W̲O̲R̲K̲ ̲O̲V̲E̲R̲V̲I̲E̲W̲
The nodal switching centres are configured with three
functional entities:
the NODE - providing access to FIKS for data termi-
nals, interfacing MEDEs, and peforming
network-oriented functions common to both
data and message traffic
the MEDE - Message Entry and Distribution Equipment,
providing access to FIKS for communications
centers and performing terminal-oriented
functions related to message trafic
the SCC - System Control Center, providing network
supervision and control, and functions
as a center for software development and
maintenance.
These FIKS system elements may be co-located and physically
integrated.
Initially, FIKS is strctured as an 8-NODE grid network
whose topology, shown in figure 1, is described in
the sections to follow.
M̲E̲S̲S̲A̲G̲E̲ ̲U̲S̲E̲R̲S̲
Message users are served through a number of COMCENTERS.
About 150 mes- sage terminals-assigned to the COMCENTERS-are
iven ac- cess to FIKS through dedicated or multiplexed
low and
medium speed circuits terminated in the ODE/MEDE pro-
cessors. All message traffic is encrypted and message
traffic rates between 50 and 2400 bps can be accomo-
dated.…86…1 …02… …02… …02… …02…
Figure 1…01…FIKS NODAL NETWORK AND TERMINALS…86…1 …02… …02… …02… …02…
D̲A̲T̲A̲ ̲U̲S̲E̲R̲S̲
Data users, consisting initially of 12 data systems
ex- change information through FIKS on a continuous
or non- continuous basis through direct interconnections
with he Node processors and internodal trunk. Up to
15 dif- ferent data users with speeds ranging from
300 - 4800 bps may be multiplexed on each 9.6 kbit
trunk. Data channel set-up time is less than 75 m.sec.
per Node and delay variation with respect toset-up
time is less than 50 m.sec. per Node.
N̲E̲T̲W̲O̲R̲K̲ ̲S̲U̲P̲E̲R̲V̲I̲S̲I̲O̲N̲
The entire FIKS network is monitored and supervised
by two System Control Centers, SCCs. The SCCs handle
the exchange of messages between FIKS and NICS-TARE
on a fully automatic asis.
T̲R̲A̲F̲F̲I̲C̲ ̲S̲E̲C̲U̲R̲I̲T̲Y̲
FIKS handles all security classifications of narra-
tive messages and data transmission as well as 4 categories
of special messages. Password checks ensure that only
authorized viewers will be allowed to examine message
ontent.
Provisions have been made for security class marking,
protection of stored messages and unauthorized retrieval,
message deletion, and special handling procedures.
Crypto-graphic security equipment protects all trans-
missions. Crypto eqipment is of the type approved by
NATO, generically referred to as DOLCE. Automatic de-
tection of crypto garbling prevents loss of information.
Data streams requiring security are terminal-to-termi-
nal encrypted and routed through FIKS without ned for
decryption and re-encryption at intermediate nodes.
Stable timing is provided from frequency standards
to maintain end-to-end synchronization and bit count
inte- grity throughout the network for several weeks
without adjustment.
FIKS is designed to prevent misrouting, inadvertent
plain text and unauthorized access and retrieval. Nodal
switching equipment is separable into RED areas and
BLACK areas.
M̲E̲S̲S̲G̲E̲ ̲C̲A̲T̲E̲G̲O̲R̲I̲E̲S̲,̲ ̲C̲O̲D̲E̲S̲ ̲A̲N̲D̲ ̲F̲O̲R̲M̲A̲T̲S̲
Four categories of traffic are handled: (1) narrative
messages with precedence and multiple addressees in
FIKS standard message format (SMF) with the essential
elements of the ACP-127 format; (2) service messages
sing an abbreviated format; (3) continuous data requiring
virtually dedicated channels with minimum delay and
routed as an un-interrupted bit stream; and, (4) discontinuous
data requiring channels on a call-up basis with predictable
set-up time anddelay. For message traffic, FIKS will
accept either 5-level (Baudot/ITA-2) or 7-level (ASCII/ITA-5)
codes; inter- nally, message processing and storage
will be in ASCII code.
For data traffic, FIKS will accept any format or code,
as FIKS is compltely transparent to the formats and
protocols used for the continuous and discontinuous
data categories.
.
Narrative messages are modified before transmission
to add an envelope containing FIKS internodal routing
and local address information, an the original messages
are restored at the destination terminals.
Internal to the FIKS network, between Nodes, all traf-
fic is handled as packets compatible with HDLC protocol.
A special protocol (LITSYNC) is used between FIKS
and NICS-TARE.
M̲E̲S̲S̲A̲G̲E̲ ̲E̲N̲T̲R̲Y̲,̲ ̲S̲T̲O̲R̲A̲G̲E̲ ̲A̲N̲D̲ ̲D̲I̲S̲T̲R̲I̲B̲U̲T̲I̲O̲N̲
Messages enter the FIKS network from a number of mes-
sage preparation and receiving terminals such as tele-
printers and visual display units. The total capacity
of the MEDE is 242 terminals and 12 interfces to host
computers. Message preparation is interactive with
prompts from the MEDE computer. An example of a message
preparation format (SMF) is shown in figure 2. The
underlined portions are either prompts or other computer
inserted information.…86…1 …02… …02… …02… …02…
Message terminal operators can use a number of inter-
active procedures such as:
- preparation (4 types)
- coordination
- release
- retrieval
- readdressing
- distribtion, local
- log on
- log off
- special handling
- editing…86…1 …02… …02… …02… …02…
FIKS MESSAGE PREPARATION FORMAT
(CR) = carriage return)
P̲R̲O̲C̲ PRE (CR)
A̲B̲C̲ ̲1̲2̲3̲ (CR)
F̲O̲R̲M̲A̲T̲T̲E̲D̲ ̲M̲E̲S̲S̲A̲G̲E̲ A21 (CR)
P̲R̲E̲C̲ ̲A̲C̲T̲ O (CR)
P̲R̲E̲C̲ ̲I̲N̲F̲O̲ R (CR)
F̲M̲ / (CR) C̲H̲D̲D̲E̲N̲
T̲O̲ AIG 1601 (CR)
X̲M̲T̲ (CR)
T̲O̲ E104 / (CR) T̲A̲C̲D̲E̲N̲
T̲O̲ (CR)
I̲N̲F̲O̲ X115 (CR)
I̲N̲F̲O̲ (CR)
B̲T̲
C̲L̲A̲S̲S̲ NS (CR)
S̲P̲E̲C̲A̲T̲ (CR)
S̲I̲C̲ RHQ (CR)
.......TEXT............
NNNN (CR)
B̲T̲
D̲T̲G̲ / (CR) 0̲1̲2̲3̲4̲7̲z̲ ̲J̲A̲N̲
P̲R̲O̲C̲
Fi. 2…01…FIKS MESSAGE PREPARATION FORMAT…86…1 …02… …02… …02… …02…
The MEDEs are manned 24 hours a day and MEDE super-
visors have control over the security and traffic of
the system and its terminals. A number of special pro-
cedures are availabe for supervisor, e.g.:
- distribution (2 types)
- control of terminal queue status
- re-arrangement of queues
- relocation of queues
- re-routing of terminal traffic
- block/unblock terminals
- security interrogation of terminals
establishment of PTT data net connections
- updating of route and address tables
- security profile handling
- call-up of daily traffic statistics
Full accountability is provided for all messages.
Messages are queued by precedence to theNode for network
routing and for automatic distribution to local addressees.
All outgoing and incoming messages are stored at the
MEDEs for 10 days. SPECAT messages will be deleted
from local storage after transmission and delivery.
Retrieval of essages from 10 day storage by authorized
users are provided. Messages can be retrieved by message
identification subject indicator codes (SIC) and date/time
indication.
M̲E̲S̲S̲A̲G̲E̲ ̲R̲O̲U̲T̲I̲N̲G̲ ̲A̲N̲D̲ ̲D̲A̲T̲A̲ ̲S̲W̲I̲T̲C̲H̲I̲N̲G̲
Message traffic is relayed from the oriinating MEDEs
through intermediate FIKS Nodes to the destination
MEDEs, and data traffic is transferred between terminals
directly interconnected to FIKS Nodes over internodal
trunks. The associated message routing and data line
switching functionsare allocated to the Node processors.
Messages received by the Node are routed to other Nodes
or delivered to the locally connected MEDE on the basis
of routing indicators and precedence contained in a
special header. Each Node is interconnected o adjacent
Nodes through at least 3 independently routed trunks.
The optimum trunk route to the final destination Node
is based upon shortest route (minimum hop) and network
connectivity. A routing algorithm is used which allows…86…1
…02… …02… …02… …02…
the Node to be independent of SCC control. SCC will
be informed of all changes in the network and calculate
routing tables for optimization of the network traffic.
The SCC routingalgorithm uses weighted delay factors
for the individual trunks. These weighting factors
will be derived from the traffic Q-reports and be used
to calculate message routing tables which are down-loaded
to the Nodes.
The routing tables contain thre alternative routes
per destination and the Nodes select the proper routes
from the tables based on trunk queue lengths. If both
SCCs are in-operative, the Node/MEDE supervisors can
manual- ly update the tables.
Data traffic - both continuous an discontinuous - is
switched through predetermined routes over internodal
trunks. Each data user is allocated a primary and a
secondary route through the network. If the primary
route fails, the secondary route is automatically established.
Switch-ack to the primary route is con- trolled by
supervisory commands.
End-to-end set-up and transmission delays will be less
than 1 second. The Node is transparent to data traffic;
all data traffic is in the black. Crypto synchronization,
channel cordination, error control, and recovery procedures
are terminal-to-terminal or computer-to- computer.
S̲Y̲S̲T̲E̲M̲ ̲S̲U̲P̲E̲R̲V̲I̲S̲I̲O̲N̲,̲ ̲C̲O̲N̲T̲R̲O̲L̲ ̲A̲N̲D̲ ̲M̲A̲I̲N̲T̲E̲N̲A̲N̲C̲E̲
Centralized supervision and control of the overall
FIKS network maintains network efficiency and reulates
or restores service in case of congestion, outages,
or failures. Continuous network status is monitored
and displayed at System Control Centers. Two SCCs are
provided but neither is dualized; back-up is geographic.
Both SCCs may be on-line wth one exercising network
control and the other on standby monitoring the network;
or, the second may be off-line and dedicated to program
development, maintenance, or training.
The SCCs exercise control of the network by use of
a number of proceures, e.g.:.
- threshold setting for trunk queue lengths
- threshold setting for message retransmission rate
- control of SCC switchover
- change of tables
- request of diagnostic results rom Node/MEDEs
- open/close trunks
Control messages from the Node/MEDEs concerning traffic
queues, trunk and Node status, retransmission rate
and, equipment availability, etc. are transmitted to
the SCCs; from this, statistics are gathered, alar
condi- tions noted, and reports presented to allow
timely net- work decisions by supervisory personnel.
A log of con- trol messages and SCC action provides
an audit trail to trace all network control actions.
Downline loading of routing, securit and address tables
from the SCC to the network permits selective re-routing
of message traffic, change of routing plan, reconfiguration
of the network, and change of security tables.
The current operational status of the FIKS nodal net-
work is isplayed on a color TV, dynamically updated
by reports and alarms from the network.
The open/closed status of each internodal trunk and
ac- tive PTT back-up channels as well as configuration
and availability of each Node/MEDE and SCC are displaye.
Statistics are gathered by the SCC from control mes-
sages, periodic reports and traffic received from the
network. Message flow, trunk usage, queuing delays,
outages, equipment up-time, and other statistics will
be available for off-line statitical analysis, reports
and network planning. A summary message traffic report
will be automatically generated and distributed every
24 hours to the Node/MEDEs.
The interchange of message traffic between the FIKS
and NICS-TARE network will be perormed by SCCs. TARE
may send messages to FIKS terminals; national routing
indi- cators and addressees will be recognized and
the mes- sage will be converted from ACP-127 format
to FIKS Standard Message Format for routing and distribution
on the FIK network. Similarly, FIKS terminals will
send messages to TARE Using NATO addresses.
Maintenance of the system is performed partly by Node/MEDE
supervisors crosstrained to operate the off-line diagnostic
programs, change modules and perform manual switchover,
and artly by technicians located at the two SCCs and
a technician mobile team which can be called out to
the different sites to locate and repair faults. Software
personnel will be located at the two SCCs.
4. E̲q̲u̲i̲p̲m̲e̲n̲t̲ ̲D̲e̲s̲i̲g̲n̲
F̲I̲K̲S̲ ̲G̲e̲n̲e̲r̲i̲c̲ ̲E̲l̲e̲m̲e̲n̲t̲s̲
The generic elements of FIKS and their interrelation-
ship are shown in Figure 3. The various demarcation
points which will be encountered between the Node/MEDE/SCCs,
FIKS Network, COMCENTERs, message terminals, data systems,
computers, and data erminals are also indicated.
The FIKS system is implemented on Christian Rovsing
A/S' CR80 computer system. …86…1 …02… …02… …02… …02…
Fig. 3…01…FIKS GENERIC ELEMENTS…86…1 …02… …02… …02… …02…
5. E̲x̲p̲a̲n̲d̲a̲b̲i̲l̲i̲t̲y̲
The FIKS nodal switching center are based on a multiprocessing
concept that provides a growth potential from 1 to
30 million instructions per second (MIPS). Groth is
implemented by simply adding more modules of equipment
instead of replacing old equipment. The modularity
of the system supports this expandability and enables
extensions to be performed without system interruption.
In its actual configurtion, FIKS has an installed capa-
city for 25% growth and a wired capacity for three
times the actual load. In addition, the network has
been designed for distribution of electronic mail
and for handling of digital telephone transmission.