top - download
⟦bf65a43a2⟧ Wang Wps File
Length: 16747 (0x416b)
Types: Wang Wps File
Notes: ACCESS
Names: »3272A «
Derivation
└─⟦c33acb2c5⟧ Bits:30006217 8" Wang WCS floppy, CR 0278A
└─ ⟦this⟧ »3272A «
WangText
DOC: NO: 3272A
ACCESS PART I - SYSTEM PROPOSAL
SYS/1983-01-25
SUBPART A - GENERAL
Page
#
A C C E S S
AUTOMATED COMMAND AND CONTROL
EXECUTIVE SUPPORT SYSTEM
PART I
SYSTEM PROPOSAL
SUBPART A
GENERAL
DOC. NO. ACC/8004/PRP/001 ISSUE 1
SUBMITTED TO: AIR FORCE COMPUTER AQUISITION CENTER (AFCC)
Directorate of Contracting/PK
Hanscom AFB
MA 01731
U S A
IN RESPONSE TO: SOLICITATION NO. F19630-82-R-001
AFCAC PROJECT 211-81
PREPARED BY: CHRISTIAN ROVSING A/S
SYSTEMS DIVISION
LAUTRUPVANG 2
2750 BALLERUP
DENMARK
…0e…c…0f… Christian Rovsing A/S - 1982
This document contains information proprietary to Christian
Rovsing A/S. The information, whether in the form of text,
schematics, tables, drawings or illustrations, must not be duplicated
or used for purposes other than evaluation, or disclosed outside
the recipient company or organisation without the prior, written
permission of Christian Rovsing A/S.
This restriction does not limit the recipient's right to use
information contained in the document if such information is
received from another source without restriction provided such
source is not in breach of an obligation of confidentiality
towards Christian Rovsing A/S.
1. G̲E̲N̲E̲R̲A̲L̲
1.1 C̲o̲v̲e̲r̲ ̲L̲e̲t̲t̲e̲r̲
Gentlemen,
Christian Rovsing A/S is pleased to submit the enclosed
proposal in response to your RFP F19630-82-R-0001 for
an Automated Command and Control Executive Support
System ACCESS AFCAC Project number 221-81).
The decision to bid the Strategic Air Command (SAC)
Automated Command and Control Executive Support System
(ACCESS) as Prime Contractor represents a definate
commitment on the part of Christian Rovsing A/S to
devote its resources and technical talents to specialized
Computer System Applications.
For the past decade, a large percentage of Christian
Rovsing A/S resources has been devoted towards advanced
military Computer Systems. The company has participated
in several major programs either as Prime Contractor
or Principal Sub-Contractor. System Contracts awarded
to the company are typically worth several millions
of dollars.
The Christian Rovsing A/S proposal includes utilization
of a fault tolerant computer system equipped with the
most advanced peripherals found on the US market.
Our proposed solution provides SAC with a very flexible
system, with practically unlimited growth potential.
The System Software provided with the Christian Rovsing
A/S system is one of the most secure operating systems
available to-day. It has heen presented to the US
DOD, and TRW are presently evaluating it for NATO Authorities.
The application software to be developed for the ACCESS
System will be very user friendly to both the experienced
user and the inexperieced user. All subsystems will
be totally integrated from a user point of view, but
still maintain flexibility and modularity so that future
modifications and enhancement may be easily implemented.
Based on our experience with support service for NATO
in Europe and our committment to large users in Canada
and USA, Christian Rovsing A/S will guarantee SAC all
the support service needed in the daily operation.
Christian Rovsing A/S has already initiated the implementation
of a Functional Live Test Demonstration which will
cover all essential parts of the ACCESS Proposal.
The proposal has been outlined in accordance with the
quidelines of the RFP. Emphasis has been put on presentation
of the entities available for setting up a system like
ACCESS as mentioned above, while Christian Rovsing
A/S propose to design the actual application in close
cooperation with the users. It is our belief that
this is the best way to ensure the objective of establishing
a user friendly system with full ergonomic considerations.
Kind Regards,
Christian Rovsing A/S
Gert Jensen
System Division Manager…86…1 …02… …02… …02… …02…
1.2 E̲X̲E̲C̲U̲T̲I̲V̲E̲ ̲S̲U̲M̲M̲A̲R̲Y̲
Christian Rovsing A/S's proposed system architecture
for the ACCESS System is based on extensive experience
in designing highly reliable and secure systems to
military and civilian users with unique requirements,
e.g. NATO or airline companies. The system is based
on the company's flexible CR80 computer system; a computer
characterized by its reliability, security and flexibility.
R̲e̲l̲i̲a̲b̲i̲l̲i̲t̲y̲
The CR80 is presently used to form extremely high reliable
communication front ends, with hot stand by concept.
The computer system is furthermore, used in large
cost effective fault tolerant communication systems,
where one computer act as back up for several active
computers.
S̲e̲c̲u̲r̲i̲t̲y̲
Many unique features of the CR80 allows the construction
of highly secure systems. The hardware of the CR80
provides total segregation of all application program
under control of a memory mapping hardware module.
The operating system software of CR80 called DAMOS,
Distributed Advanced Multiprocessing Operating System,
is built around a small highly secure kernel and a
number of operating system processes, each with its
own security profile.
Christian Rovsing A/S 's concept for implementing secure
systems entails a system architecture which differs
from the old fashion large mainframe systems, where
the software system, including both system software
and appliction software, is one large addressing room
with no or only minor segregateion of the various parts.
Christian Rovsing A/S has been following the US DOD
work on the definition of multilevel secure systems,
and we have presented our concept to DOD with great
success. Christian Rovsing A/S is presently in the
coding and integration phase of a large Computer Aided
Message Processing System, CAMPS, to NATO which is
being evaluated by TRW from a security point of view
before deployment. The preliminary result of this
evaluation concludes that the CR80 equipped with the
DAMOS operating system is well suited for implementing
a secure system in accordance with military requirements.…86…1
…02… …02… …02… …02…
F̲l̲e̲x̲i̲b̲i̲l̲i̲t̲y̲
The CR80 is a very flexible computer system. It allows
implementation of many functionally different systems
from very small systems (0.6 MIPS), e.g. protocol converters
to huge integrated systems (more than 30 MIPS), e.g.
Network Communication Systems.
The flexibility of the CR80 has been used by Christian
Rovsing A/S to implement a variety of different systems.
Similarly our customers have benefited from the flexibility
of the CR80 by getting expandable and field upgradable
systems with a large growth potential. The same hardware
modules are used to build both small and large systems,
allowing the sharing of spare parts for many different
systems.
1.2.1. A̲C̲C̲E̲S̲S̲ ̲S̲Y̲S̲T̲E̲M̲ ̲D̲E̲S̲C̲R̲I̲P̲T̲I̲O̲N̲
An artistical view of the future ACCESS computing room
is provided in the end this subpart. The proposed Access
System will be described from three different points
of view,. i.e. the Hardware, Software and the Communication
Subsystem
1.2.1.1 A̲C̲C̲E̲S̲S̲ ̲C̲O̲M̲P̲U̲T̲E̲R̲ ̲H̲A̲R̲D̲W̲A̲R̲E̲
Christian Rovsing A/S propose to divide the computing
system in a front end and back end system. The front
end system will perform all the application processing
initiated by the terminal users, while the back end
subsystem will perform and coordinate all tasks related
to Data Base Management (Ref. FIG. 1.2.1.-1).
F̲r̲o̲n̲t̲ ̲E̲n̲d̲ ̲S̲u̲b̲s̲y̲s̲t̲e̲m̲
The Access Front End System consists of two sets of
fully dualized CR80 Systems. Each dualized system
comprises two interconnected CR80. Each dualized system
is interconnected within itself to allow total load
sharing, when both CR80 computers are active and all
hardware modules are operational.
FIG. 1.2.1-1
HARDWARE SYSTEM OVERVIEW…86…1 …02… …02… …02… …02…
FIG. 1.2.1-2
ACCESS, FRONT-END PROCESSOR
RACK LAYOUT…86…1 …02… …02… …02… …02…
FIG. 1.2.1-3
ACCESS, BACK-END and DATABASE
PROCESSORS
RACK CONFIGURATION…86…1 …02… …02… …02… …02…
The fault tolerant front end system will continue to
work after the occurrence of a single point failure
because all system parts has been dualized. However,
as a consequence of the load sharing concept, a single
point failure may cause a lower performance, where
no system part is kept as spare.
B̲a̲c̲k̲ ̲E̲n̲d̲ ̲S̲u̲b̲s̲y̲s̲t̲e̲m̲
The Back End System consists of a dualized CR80 System
and a mirrored set of dedicated Intelligent Database
Machine, IDM. The dualized CR80 monitors and coordinates
all tasks to be performed on the IDM. The dualization
used on the CR80 Back End System is the n + 1 concept
in its initial version (due to small workload), where
one Processor Unit, PU is stand by for one active PU,
while the associated Channel Unit, CU is dualized within
itself by having its two buses connected to the active
and the stand by PU respectively and by having a mirrored
set of all hardware modules.
The dedicated mirrored IDM's maintain two identical
versions of the data base. The IDM allows implementation
of many DMBS features in hardware and firmware resulting
in a much more cost effective and efficient DBMS implementation
than the host embedded DBMS Implementation. The IDM
ensures complete data base integrety independent of
terminal and other peripheral events, because of the
strict and well defined interface between the IDM and
the rest of the system.
The mirrored IDM concept serves several objectives:
- ensures fast and easy back up in case of disc failures,
because the system can continue operations with
only one operative IDM.
- load sharing between the two IDM is obtained by
a very high degree, because approximately 80% of
all data base transactions are 'read only' which
can be performed on each IDM in an alternating
scheme, while only 20% of the transactions are
'creates' or 'updates' requiring amendments to
both IDM's.
- avoidance of frequent periodic back up copying
and transaction filing, which entails long off
duty hour manning of the system.
The success of the CR80 is closely related to the three
main features mentioned earlier, reliability, security
and flexibility. These three characteristics are synonymous
with the requirement set up by US Air Force, i.e. ease
of use, growth potential and operation and maintenance.
1.2.1.2 A̲C̲C̲E̲S̲S̲ ̲C̲O̲M̲P̲U̲T̲E̲R̲ ̲S̲O̲F̲T̲W̲A̲R̲E̲
The proposed ACCESS System will run under control of
the CR80 operating system DAMOS, Distributed Advanced
Multiprocessing Operating System, which resides in
the CR80's of both front end and back ends. The two
mirrored IDM's, Intelligent Database Machines are equipped
with software/firmware to implement a relational database.
D̲A̲M̲O̲S̲
This is Christian Rovsing A/S's standard operating
system used to control all different types of CR80
configuration in a highly secure manner, well suited
for implementation of systems in military environments.
DAMOS can support from 1 to 5 CPU's in each processor
Unit, PU's and it allows 16 PU's to be run as one integrated
system. DAMOS can utilize 16 Megawords per PU, 1
Megaword in the PU itself and 15 Megawords in attached
Channel Units. Each execution of a program is called
a Process. Each process is totally segregated from
other processes by a hardware mapping modules, which
ensures a highly secure system . Instruction areas
can not be modified. Similarly the DAMOS itself is
controlled by a small kernel which monitors the processing
of all other processes and hence performs security
checks on executing software.
R̲e̲l̲a̲t̲i̲o̲n̲a̲l̲ ̲D̲a̲t̲a̲ ̲B̲a̲s̲e̲ ̲M̲a̲n̲a̲g̲e̲m̲e̲n̲t̲ ̲S̲y̲s̲t̲e̲m̲
The DBMS is implemented on two dedicated machines to
provide the most cost-effective and efficient system.
Similarly the relational concept is much more user
friendly than earlier concepts like structural and
network organization.
A simple comparison of the three data base models,
relational, hierarchial and network provides the following
results:
- the language features required to declare a relational
data base are a subset of those required to declare
a hierarchial data base, and these in turn are
a subset of those required to declare a network
database;
- the language operators required to manipulate a
relational database are a subset of those required
to manipulate a hierarchial database, and these
in turn are a subset of those required to manipulate
a network database;
- (For a given operator, as applicable) the language
operators required for a relational database are
a subset of those required for a hierarchial database,
and these in turn are a subset of those required
for a network database.
However, one major draw back has prevented the relational
database from being used more widely than the other
two, and that was performance requirements. When implemented
on traditional host computer system, the relational
database concept could not be tuned to the extent of
the other two models.
Now, due to the three earlier simple characteristics
it has been feasible to implement many data base management
functions directly in hardware and firmware with the
result that all short-comings of the relational model
has been more than offset by using dedicated systems.
E̲a̲s̲e̲ ̲o̲f̲ ̲U̲s̲e̲ of ACCESS software will be provided by
Christian Rovsing A/S through our experience in implementation
of user friendly man-machine systems like CAMPS to
NATO. System Menus and prompts are used throughout
the system and HELP functions are available to any
inexperienced user. Similarly the relational database
concept is more user friendly than previous concepts.
S̲e̲c̲u̲r̲i̲t̲y̲ features is one of the major characteristics
of the DAMOS operating system.
F̲l̲e̲x̲i̲b̲i̲l̲i̲t̲y̲ has always been a major objective to Christian
Rovsing A/S. We use the same operating system for all
types of H/W mapped systems and our customers are ensured
growth capabilities due to this concept.
O̲p̲e̲r̲a̲t̲i̲o̲n̲s̲ ̲a̲n̲d̲ ̲M̲a̲i̲n̲t̲e̲n̲a̲n̲c̲e̲ has been automated to the
extent possible by extensive use of maintenance and
diagnostic software.
I̲m̲p̲l̲e̲m̲e̲n̲t̲a̲t̲i̲o̲n̲ and especially field upgrades are easily
obtained because of the standard versions of DAMOS
is already prepared for all different possible configuration.
1.2.1.3 C̲O̲M̲M̲U̲N̲I̲C̲A̲T̲I̲O̲N̲S̲
The proposed ACCESS System will utilize the X-Net local
area network to interface all remote and local terminals,
i.e. VDU's, CGDU, Video Copies and Letter Quality Printers.
The local area network of ACCESS is built up of 8 dualized
X-Nets in order to provide the requested minimum delay
and the requested free terminal connect points. The
dualization concept ensures that a single point failure
in a net will not prevent any terminal from operative
usage.
G̲r̲o̲w̲t̲h̲ ̲P̲o̲t̲e̲n̲t̲i̲a̲l̲ is achieved in ACCESS's Configuration
because new X-Nets can be added to the front ends as
requested. Each X-net has a bit rate of 2 Megabits
giving a total bit rate of 16 megabits. The X-Net is
already in use as a virtual circuit switching system
with a uniform delay for data transfer in the Danish
Defence Integrated Communication System, FIKS. This
capability of mixing packet switching and line switching
is a prerequisite for a digitized voice communication.
The digitizing technic called Line Predictive Coding,
LPC can be used to transform the voice to 2400 bit/sec
data frames, which can be line switched on the X-Net.
Regarding video communication, then the X-Net utilizes
coaxables known from TV-antenna connections, but the
provided hardware modules and software used in the
X-Net must be replaced with custom built video equipment.
F̲l̲e̲x̲i̲b̲i̲l̲i̲t̲y̲ is provided in the ACCESS local area network
by the installation of 8 dualized X-Nets. Each X-Net
is only supporting approx. 50 terminals, while 250
can be served on each net, giving 200 spare terminal
positions for terminal mobility.
I̲m̲p̲l̲e̲m̲e̲n̲t̲a̲t̲i̲o̲n̲ of the local area network can be done
within the procedures allowed in the ACCESS RFP, i.e.
2 inch tubes. Connections to remote site using encrypted
lines can be established anywhere on an X-Net.