Military Embedded Systems July August 2017
Military Embedded Systems July August 2017
Technology Update
Spectrum management for SDRs 12
Industry Spotlight
Cyberwarfare calls for system resilience 32
MIL-EMBEDDED.COM July/August 2017 | Volume 13 | Number 5
P 16
P 36
Establishing a root of trust: Trusted computing and Intel-based systems
By Steve Edwards, Curtiss-Wright Defense Solutions
Videocentric
ISR missions push
rugged computing
to the limits
P 22
Our individual brands
are coming together
to connect as one -
Smiths Interconnect
www.mil-embedded.com
July/August 2017
COLUMNS
BUDGET HIGHLIGHTS Editor’s Perspective
DoD Budget Requests FY 2018 7 Radar’s role at Pearl Harbor
16 DoD major program procurement By John McHale
and modernization highlights from FY 2018 Field Intelligence
budget request 8 3U OpenVPX plus 40-gig Ethernet –
By John McHale, Editorial Director best of both worlds
By Charlotte Adams
MIL TECH TRENDS
Rugged Computing Mil Tech Insider
16 10 Augmented reality and
22 Videocentric ISR missions push rugged video-management systems
computing to the limits By Kevin Rooney
By Mariana Iriarte, Associate Editor
Technology Update
26 Performance increases still needed for 12 The role of machine learning
full adoption of mobile rugged computing for in autonomous spectrum sharing
military use By Mariana Iriarte
By Mariana Iriarte, Associate Editor
Cybersecurity Update
28 Integrated panel PC solves many challenges in 44 The power of light: A shortcut to
limited-space battlefield applications satellite-based quantum encryption
By Chris Ciufo, General Micro Systems By Sally Cole
26 University Update
INDUSTRY SPOTLIGHT 45 Robotics family leverages open
Cyberwarfare Technology architectures to counter explosive
32 Cyberwarfare: A “Wild West” of ordnance threats
nonkinetic weaponry By Mariana Iriarte
By Sally Cole, Senior Editor
WEB RESOURCES
Subscribe to the magazine or E-letter
Live industry news | Submit new products
http://submit.opensystemsmedia.com
White papers:
Read: http://whitepapers.opensystemsmedia.com
Submit: http://submit.opensystemsmedia.com
36 22
www.linkedin.com/groups/ ON THE COVER:
Military-Embedded- Published by: Top image: U.S. sailors aboard the Pre-Commissioning
Systems-1864255 Unit Gerald R. Ford (CVN 78) – the first ship built in a
new class of U.S. aircraft carriers – man the rails as
@military_cots
the ship pulls in to Norfolk, Virginia, on April 14, 2017,
after conducting builder’s sea trials. U.S. Navy photo
by Mass Communication Seaman Gitte Schirrmacher.
All registered brands and trademarks within Military Embedded Systems magazine Bottom image: The 721st Communications Squadron
are the property of their respective owners. provides monitoring of the nation’s strategic missile-
© 2017 OpenSystems Media © 2017 Military Embedded Systems warning systems to ensure a constant flow of key
ISSN: Print 1557-3222 information. Photo courtesy of the U.S. Air Force/
Airman 1st Class Krystal Ardrey.
SCADA SCADA SCADA SCADA ENERGY ENERGYENERGYENERGYIOT SCADA IOT IOT TRANSPORTATION
IOT TRANSPORTATION
ENERGY TRANSPORTATION
TRANSPORTATION
817-274-7553 | www.winsystems.com
AUTOMATION IOTAUTOMATION AUTOMATION TRANSPORTATION
AUTOMATION AUTOMATION
(586) 415-6500
18 Kensington Electronics, Inc. –
Do you want crucial data transferred MARKETING MANAGER Eric Henry [email protected]
to be Resistant to it or Immune to it? (541) 760-5361
21 LCR Embedded Systems – STRATEGIC ACCOUNT MANAGER Rebecca Barker [email protected]
Fully integrated systems and platforms (281) 724-8021
for end-to-end unmanned systems STRATEGIC ACCOUNT MANAGER Bill Barron [email protected]
39 MPL AG – Rugged flexible COTS (516) 376-9838
solutions from MPL
STRATEGIC ACCOUNT MANAGER Kathleen Wackowski [email protected]
48 Pentek, Inc. – Unfair advantage (978) 888-7367
39 Phoenix International –
SOUTHERN CAL REGIONAL SALES MANAGER Len Pettek [email protected]
Airborne, shipborne, ground mobile
(805) 231-9582
data recording and data storage
27 PICMG – Mil/Rugged solutions using SOUTHWEST REGIONAL SALES MANAGER Barbara Quinlan [email protected]
PICMG specifications (480) 236-8818
2 Smiths Connectors – Our individual NORTHERN CAL STRATEGIC ACCOUNT MANAGER Sean Raman [email protected]
brands are coming together to (510) 378-8288
connect as one – Smiths Interconnect ASIA-PACIFIC SALES ACCOUNT MANAGER Elvi Lee [email protected]
10 Star Communications Inc. –
BUSINESS DEVELOPMENT EUROPE Rory Dear [email protected]
Signal processing receivers; +44 (0)7921337498
computing accelerators
37 Themis Computer –
RES HD high density server
5 WinSystems, Inc. –
Rugged, reliable, and resilient
embedded computing solutions WWW.OPENSYSTEMSMEDIA.COM
10 Z Micro, Inc. – Introducing ZMicro’s PRESIDENT Patrick Hopper [email protected]
new ZM3 compact computer
EXECUTIVE VICE PRESIDENT John McHale [email protected]
42 Z Micro, Inc. – COM Express
Type 7 will revolutionize rugged EXECUTIVE VICE PRESIDENT Rich Nass [email protected]
ISR computing CHIEF FINANCIAL OFFICER Rosemary Kristoff [email protected]
CHIEF TECHNICAL OFFICER Wayne Kristoff
Many of you might not know that the first use of radar in a battlefield situation was
during the attack on Pearl Harbor, December 7, 1941. Just prior to the attack by
Japanese aircraft, U.S. Army personnel were training on brand-new radar equipment
when they spotted incoming aircraft, but the warning was thought to be friendly
aircraft and was subsequently ignored.
I had never heard that part of the story and learned about it while visiting the Arizona
Memorial at Pearl Harbor, Hawaii, last month while attending the International
Microwave Symposium (IMS) in Honolulu. Yeah, I know, I know … tough assignment,
but we endured …
The morning of December 7, radar operators – Army Privates Joseph P. Lockard and
George Elliott – at the Opana radar station detected approaching aircraft and called
the officer on duty at the Fort Shafter Information Center, 1st Lt. Kermit A. Tyler, who
was on his first day at the station, according to an exhibit at the Pearl Harbor Historical
Site museum. Tyler said that Lockard told him that “it was the biggest plot he had ever
seen, and I told him ‘Don’t worry about it. It’s OK.” [Pictured: The oscilloscope and
radar equipment used by Lockard and Elliot (top) and the Opana radar plot (bottom).]
Tyler later explained that he thought it was likely a flight of B-17s due to land at
Hickam Field at 0800 that morning, saying “There was no way of telling what they
were. The problem was, [at that hour] we had no identification people on staff.”
Mobile radar and radar in general was so new to U.S. military forces that they were
still training and learning how to use it.
Lt. Gen. Walter C. Short, commander of the military defenses at Pearl Harbor in 1941,
said that he did the radar operations “for training more than any idea it would be real.” attack before boarding the transport to
the memorial.
Present time
I also thought it ironic to be reading about the early use of radar while I was in Once you enter the memorial, you
Hawaii attending IMS, an RF and microwave technology event where exhibitors and can actually still smell the oil leaking
attendees discussed the latest RF technologies, such as gallium nitride (GaN) compo- from the wreckage below, even now,
nents. These components are driving the increased capability of radar systems today, 76 years later. (Not to worry, the leak
such as active electronically scanned array (AESA) radar systems, which use a large is monitored so it doesn’t become an
amount of RF components. environmental hazard.) The site and
the wreckage remain untouched, as it
“Radar, in general, has the broadest market for RF with UHF, L-, S-, C-, and X-Band fre- is sacred ground, not just to the U.S.
quencies all seeing upgrades from legacy technologies which have less performance,” military, but to the American people. It
said Ryan Baker, product marketing manager for RF components at Wolfspeed, an is the grave of the sailors who lost their
exhibitor at IMS this year. “It’s the largest RF market within the military arena. New lives that day.
systems will be funded and RF will play into that funding as a driver.”
Time onboard will be limited; aside from
U.S. forces were not properly structured in 1941 to take advantage of radar prior to your smartphone’s camera, device use is
the attack, but since then the technology has saved countless lives and represents restricted. So rely on your imagination
perhaps the largest growth area for military suppliers of RF and microwave technology and your senses, close your eyes, and
as well as embedded computing systems. think about what happened there. Read
the names on the wall on the far side of
Back to Pearl Harbor the memorial. Say a prayer or a quiet
Every American should definitely experience a visit to the Arizona Memorial if “thank you” for those that gave their
they are anywhere near the island of Oahu. Visitors watch a short film about the lives that day.
a single 3U VPX board supercomputer at only 20 in3 and 2.2 lb! GPGPU, CPU, frame grabber and extensive I/O
* Extended temp cold-plate HPEC version also available (A196)
Over the last few years, the concept of augmented reality, in which computer- and other powerful mission information
generated imagery is combined with views of the real world, has become mainstream. onto a helmet visor or on glasses takes
Formerly found only in very high-end applications, such as helmet-based heads-up the LCD display out of the equation.
displays for fighter-jet pilots, this next-generation graphics capability is poised to Before, if operators turned their head
revolutionize applications such as search and rescue (SAR) and airborne surveillance. away from the video screen, they paid
the penalty of missing sensor data.
As the operator is asked to look at more and more information, we’re seeing display
sizes grow increasingly large. Part of the problem is that it’s very difficult to sit close With augmented reality displayed prop-
to a large display and effectively absorb all of the information it presents. It’s akin erly on a visor or glasses, the o perator’s
to watching a movie while seated in the front row of the theatre. On platforms such viewing experience is optimized, enabling
as helicopters and fixed-wing aircraft, the space constraints make it unlikely that the the operator to access additional data
operator can sit any distance from the video screen. As a rule of thumb, given a person resources, whenever and wherever they
with 20/20 vision seated 18 inches away from a screen, the largest video display that turn their head. For the operator, the
can be realistically viewed optimally is 17 inches. As displays increasingly embrace the ability to view the real world and have
use of HD, 2K, and 4K formats, the high level of information and detail delivered will overlaid information (such as Google
be difficult to view if the operator is seated too close to the screen. Maps) makes them much more effective,
while essentially removing the technology
Augmented reality promises a solution that solves the constrained space issue, provides as an intermediary barrier. As information
access to more useful and actionable data, and enables a more natural and effective is delivered to the operator in a more
interaction with the real world. Overlaying moving map data, license-plate identification, human, seamless, and intuitive way, the
8TB 3840
8x HD Video Streams
Storage GPU Cores
LEARN MORE
zmicro.com/ZM3 zmicro
10 July/August 2017 MILITARY EMBEDDED SYSTEMS www.mil-embedded.com
Recording and archiving the augmented-reality data, with support for time stamping, so
that the captured video can be used in an evidence chain in court. Augmented-reality
systems also offer an effective tool for crew training and scenario simulation.
As natural as it is to use a rear-view mirror while driving a car, it may well soon become
as seamless to access real-time streaming video data that makes the operator more
effective instead of removing them from the real world by placing a video screen in
› Figure 1 | Curtiss-Wright’s
RVG-SA1 analog video switch, a compact
nonblocking crosspoint switch, is an
example of a COTS element that can be
their field of vision. The next two years should see the emergence of new and prac-
tical augmented-reality solutions for a wide variety of applications. We are already
seeing military implementation of this technology; we expect that the SAR and law-
enforcement markets will follow very shortly.
used to integrate a rugged deployable
augmented-reality solution.
Kevin Rooney is managing director for video and displays, Curtiss-Wright Defense
result will be more successful missions. Solutions.
Augmented reality can also take advan-
tage of new features, such as the ability www.curtisswrightds.com
to dynamically “annunciate” or highlight
any important changes. For example,
Dawn Powers
if a target moves, the new state can be
flagged to draw the operator’s attention.
VPX
One of the challenges for designers of
augmented-reality display systems is
development of a synchronized vision
system able to handle latency of two
frames or fewer. The delay experienced
in the user’s brain, caused by a disparity
between their eyesight vision and the Dawn’s PSC-6238 VITA
movement of their body – well known 62 compliant 3U VPX Power
from virtual-reality goggle users – can Supply for conduction
cause disorientation and bring on motion cooled systems is designed
sickness. Another key element of deliv- to operate in a military
ering augmented reality is ensuring that environment over a wide
latency is consistent: When latency is range of temperatures
consistent and predictable, rather than at high power levels. Up to
random, the brain is able to develop a sort 800 Watts available power.
of muscle memory that enables it to con-
form and react to the disparity between
Onboard embedded RuSH™
what the eyes see and the body feels.
technology. Switchable Battleshort
The opportunity for commercial off- and NED functions.
the-shelf (COTS) vendors is to take this
high-end technology from the realm of
specialized applications and make it a
pervasive and cost-effective solution.
Dawn is the leader in VITA 62
Existing modular and scalable video compliant power supplies for the
gateway products can serve as the foun- mission critical market. Wide range of
dation building blocks for the devel- standard features, highly configurable
opment of COTS augmented-reality through custom firmware.
systems, supporting digital and analog
switching and video format conversion,
to develop affordable practical examples
Rugged, Reliable and You need it right.
of deployable augmented-reality solu-
tions. (Figure 1.)
Ready. You want Dawn.
Speakers and attendees at the recent NIWeek in Austin, Texas, – be essential as the population of devices linking wirelessly to
the annual conference and exhibition held by National Instruments each other and to the internet continues to grow exponen-
(NI) – discussed the technological obstacles and potential solu- tially,” Tilghman said in a statement released by DARPA.
tions for enabling autonomous spectrum sharing and touted the
U.S. Defense Advanced Research Projects Agency’s (DARPA’s) NIWeek events provided a glimpse of what the future will hold
Spectrum Collaboration Challenge (SC2) as an excellent plat- in terms of spectrum management.
form for finding such solutions.
In short, said Manuel Uhm – director of marketing, Ettus Research,
Launched in 2016, SC2’s goal is to create a collaborative a National Instruments company, and chair of the Board of
machine-learning competition to address radio frequency (RF) Directors of the Wireless Innovation Forum – at NI Week: “This
spectrum challenges. DARPA experts created SC2 to help huge effort will enable warfighters and their radios to have
users of the existing radio spectrum overcome the problem spectrum situational awareness through the machine learning
of clogged spectrum. Demand for radio spectrum has grown and AI [artificial intelligence] capabilities.”
steadily over the past century, and in the past several years has
increased at a rate of 50 percent per year. The ideal end goal of the program is to enable autono-
mous spectrum sharing. “Today we need spectrum sensors
SC2 wants to move away from traditional ways of communi- (Environmental Sensing Capability, or ESC) and a Spectrum
cating via one frequency. As DARPA’s Paul Tilghman explained Access System (SAS),” said Uhm. “In the future, it would be
during his keynote speech at NIWeek, one of the biggest amazing if none of that was necessary due to optimized and
obstacles in spectrum management is that “frequency isolation highly effective collaborative spectrum usage. It will take a
completely dominates our spectrum landscape.” long time before DoD [the Department of Defense] or com-
mercial operators put their faith in such algorithms, but one
The problem is that radios can no longer stay in one frequency can dream!”
lane and at the same time meet the growing needs of the com-
mercial and military world, Tilghman pointed out. That’s where SC2 will address current limitations in the communications
SC2 comes in: It’s an open competition to create a unique radio arena. “When a naval radar signal is detected by a spectrum
system that will autonomously collaborate with other radios sensor, all the radios – known as CBRSDs (Citizens Broadband
with no spectrum allocation. Radio Service Devices) – in that area have to stop using that
spectrum within 60 seconds of notification,” Uhm said during
A total of 30 teams joined the competition, all competing for NIWeek. “Adding more of the intelligence into the radio so
$3.75 million in prize money that will be allocated to first-, they can act more autonomously would be a tremendous
second-, and third-place winners. benefit, both commercially and for the military.”
To make this competition a reality, National Instruments The SC2 project’s avenue into enabling machine learning are
teamed up with Johns Hopkins University Applied Physics NI’s universal software radio peripherals (USRPs). “The teams
Laboratory (APL) and DARPA to create one of the biggest test are going to be controlling SDRs [software-defined radios] in
beds in history. Competitors will use what the group calls the multiple possible different scenarios,” Uhm explained. “The
“Colosseum,” with a physical location at John Hopkins, to test USRPs that the performers are going to be using have SDR and
their algorithms and eventually create radios that can cogni- cognitive radio technology by the industry definition today, but
tively collaborate with each other. the secret sauce isn’t for them to develop the radio part of it.
The radio’s a solved problem. The unsolved part is how do you
The purpose of the Colosseum – a 256-by-256-channel RF create a radio that is intelligent enough to be able to adapt
channel emulator – is to emulate the wireless environment. It dynamically to the spectrum situation that it’s facing?”
can calculate in real time more than 65,000 channel interactions
among 256 wireless devices and can emulate thousands of inter- Competitors will use the testbed to “upload machine learning
actions between all types of wireless devices that include the algorithms into those servers that are connected to the radios
Internet of Things (IoT), cellphones, military radios, and the like. and they’ll be judged on the basis of how well those algorithms
do on a series of criteria in terms of being able to communi-
“The Colosseum is the wireless research environment that we cate not just to their team members, but doing so in a way
hope will catalyze the advent of autonomous, intelligent, and – that doesn’t impinge on the communications of other teams,”
most importantly – collaborative radio technology, which will he adds.
›
within the 3.55 to 3.7 GHz for CBRS. Then, if a maritime radar Figure 1 | In this photo illustration, a few dozen of the
signal is sensed, the SAS sends a signal to stop transmitting 256 software defined radio units, which comprise the heart of
in that band to all the CBSDs in that geographic vicinity so DARPA’s Colosseum – the world’s largest “channel emulator” for
there’s no interference with the radar. Well, that SAS is a log- simulating electromagnetic communication in different peacetime
and contested contexts – rise up from an image of the original
ical component of how you could create situational awareness
Roman Colosseum, after which the electronic testbed is named.
within Colosseum. It’s also useful in a broader potential wartime Image courtesy DARPA.
scenario or other types of homeland scenario type of events
where broad communications is vital.” more than a day before being recharged, perhaps years. From
a practical perspective, those are going be scenarios where
The Colosseum in the clouds there will be very limited processing capability in the sensor to
SDR technology will enable SC2 competitors to integrate in a reduce power consumption. The sensor will communicate crit-
cloud-computing-like environment. By using such an environ- ical data to the network for decision-making. But again, that’s
ment, the testbed will be accessible by all teams from around also a tradeoff because it also consumes power to transmit
the country. “Putting such a powerful wireless testbed into back and forth to a cloud. So there are a number of tradeoffs at
the cloud is a first-of-its-kind achievement in and of itself,” the end of the day and the best answer will depend on the use
Tilghman said, “but the most exciting thing will be to see the case and requirements.”
rapid evolution of how AI solves wireless communications chal-
lenges once the competitors have this unique and powerful The benefits of these teams running these scenarios are
resource at their disposal.” enormous for the military and commercial world. “There’s
absolutely a huge commercial aspect related to having some
With cloud capabilities, the possibilities of using this testbed level of dynamic capability and cognition in your smart-
are endless. Uhm explained: “If you place the intelligence in the phone,” Uhm said “And again, some capabilities may require
cloud, you have a number of dummy nodes, whether they’re the broader dataset and processing capabilities in the cloud,
radios or some other type of sensor node that is just essen- so your phone just becomes the sensor. Taking some of the
tially passing sensor data to the cloud. In this situation, the technology developed in the DARPA Spectrum Collaboration
cloud is making the decisions and then changing the behavior Challenge and putting that into a commercial content is abso-
of the nodes.” lutely on the table and that’s what DARPA would like to see,
very honestly.”
Putting intelligence at the edge “means those nodes now have
the capability to have some level of intelligence, as well as This issue and challenge is a big deal: “The spectrum is a multi-
being able to communicate with the cloud in most scenarios. billion-dollar asset,” Uhm stated. “Maximizing the value of it is
By having processing capability right at the edge, it is possible critically important, not just for the military, but in particular for
to more quickly make decisions right at the edge. However, commercial operators, and for all of us as end users.”
having artificial intelligence in a node means that you have
to have computing resources, which consume power. For The story doesn’t stop here. Manuel Uhm and Paul Tilghman
example, we all know how long our smartphone batteries last will be hosting a full-day workshop at WinnComm 2017 on
and none of us are happy about it.” November 13-15. The workshop, titled “DARPA Spectrum
Collaboration Challenge Challenges,” will also have multiple
Which brings the competitors to some technical but well-known speakers discussing the challenges that engineers are still
challenges that include processing and power limitations within facing as well as those that have already been tackled. Check
the scenarios. “A smartphone can do amazing things within the it out to get a better picture of SC2 at WinnComm and visit
context of a day before it needs to recharge. There are going to https://spectrumcollaborationchallenge.com to learn how to
be scenarios where battery-operated sensors will need to last get involved.
NEWS
NASA’s supersonic X-plane completes preliminary AT&T and Leidos team up to transform
design review DoD network
NASA and Lockheed Martin engineers recently completed Defense Information Systems Agency (DISA) officials have
the preliminary design review (PDR) of its Quiet Supersonic tasked Leidos to automate Department of Defense (DoD) pri-
Transport (QueSST) aircraft design. QueSST is the initial design vate networking services. Under the task order, Leidos will team
stage of NASA’s planned Low Boom Flight Demonstration with AT&T to help transform the DoD Information Network
(LBFD) experimental airplane, which is also known as an X-plane. (DoDIN) to a software-defined network.
Following the PDR, Lockheed Martin and NASA engineers con- DISA’s goal is a software-defined enterprise that supports a high
cluded that the QueSST design is capable of fulfilling the LBFD degree of automation and synchronization across networking,
aircraft’s mission objectives: To fly at supersonic speeds, but hosting, and related IT systems, officials say. Leidos and AT&T
create a soft “thump” instead of the disruptive sonic boom will engineer and deliver software-defined networking con-
associated with supersonic flight today. troller technology into the DoDIN backbone. The solution uses
Over the next few months, NASA will work with Lockheed on an open framework developed by AT&T that supports the auto-
finalizing the QueSST preliminary design effort. This under- mation of network services.
taking includes a static inlet performance test and a low- Dr. Daniel Voce, Leidos senior vice president, Enterprise Cyber
speed wind tunnel test at NASA’s Langley Research Center in and Solutions, calls the move “a good initial step to trans-
Hampton, Virginia. forming the DoDIN to be more flexible, secure, dynamic, and
resilient for the warfighter.”
Sea Venom/ANL anti-ship missile completes Northrop Grumman inks torpedo contract with
first firing U.S. Navy
MBDA officials announced that the company’s Sea Venom/ANL The U.S. Navy has awarded Northrop Grumman Corp. a $9.6 mil-
anti-ship missile recently completed its first firing at the Île du lion contract, with options totaling as much as $40.5 million, to
Levant test range in France. The trial of the 100 kg-class missile produce the transducer array/nose shell assembly of the MK 48
was performed from a Dauphin test bed helicopter owned by heavyweight torpedo, the main offensive weapon deployed from
the DGA (Direction Générale de l’Armement, France’s defense- all U.S. Navy submarines.
procurement agency).
Under the terms of the initial contract, Northrop Grumman will
The Sea Venom was developed to enable enhanced capability handle engineering and production of 45 torpedo transducer
and replace existing and older systems such as the British- arrays/nose shell assemblies for the MK 48. The contract also
developed Sea Skua and the French-developed AS15TT anti- allows for three additional options of as many as 45 units apiece,
ship missiles. Jointly ordered in 2014, the Sea Venom/ANL for a total of up to 180 systems over five years, and includes
project has been developed 50/50 between the U.K. and orders for spare parts and engineering support services.
France and has played a key part in the creation of shared cen-
ters of excellence on missile technologies in both countries, Work on the arrays and assemblies will be conducted at
according to MBDA. Northrop Grumman’s Annapolis, Maryland facility; at the Ultra
Electronics Ocean Systems facility in Braintree, Massachusetts;
“Although a first firing, this was in no way a cautious one,”
and at additional supplier locations. When completed, the
stated Paul Goodwin, deputy head of the Sea Venom project.
assemblies will be delivered to the Naval Undersea Warfare
“The system was pushed to the very edge of its range capa-
Center in Keyport, Washington, for installation into complete
bility. The next step is to exercise the systems’ operator-in-the-
MK 48 torpedoes.
loop capabilities.”
DoD major
program
procurement and
modernization
highlights from
FY 2018 budget
request
By John McHale, Editorial Director
U.S. sailors aboard the Pre-Commissioning Unit Gerald R. Ford (CVN 78) man the rails as the ship pulls in to Norfolk, Virginia,
after conducting builder’s sea trials April 14, 2017. The first-of-class ship – the first new U.S. aircraft carrier design in 40 years –
spent several days conducting builder’s sea trials, a comprehensive test of many of the ship’s key systems and technologies.
U.S. Navy photo by Mass Communication Seaman Gitte Schirrmacher.
The AH-64E Apache program is a parallel new-build and remanufacture effort, which
integrates a mast-mounted fire control radar into an upgraded and enhanced AH–64
airframe. The FY 2018 program funds the remanufacture of 48 AH-64D aircraft to the
AH-64E configuration and 13 new build AH-64Es in the second year of a five-year
multiyear procurement (MYP) contract (FY 2017 to FY 2021), along with continued
development of upgrades to enhance operational capabilities. It also procures two
AH-64E aircraft in the OCO. FY 2018 funding requested is $1.441 billion, down from
$1.840 billion in the FY 2017 request.
will lessen the shortfall in naval combat aircraft. FY 2018 funding requested is with the MQ-1 Gray Eagle Extended
$1.253 billion, down from $2.504 billion in the FY 2017 request. Range engineering change proposal.
The Army plans to procure 11 UASs in
The Long Range Strike (LRS) platform is intended to counter post-2020 challenges FY 2018, which is the last planned year
to the DoD’s power projection capabilities. The FY 2018 program seeks to continue of procurement for the MQ-1C Gray
engineering and manufacturing development of the next generation B-21 and per- Eagle. FY 2018 funding requested for
form upgrades to modernize legacy strategic bombers. FY 2018 funding requested is these particular unmanned platforms is
$2.945 billion, up from $2.241 billion in the FY 2017 request. $174.4 million, down from $308.1 million
in the FY 2017 request.
The F-22 Raptor is a fifth-generation air superiority aircraft fighter. The FY 2018 pro-
gram continues planned modernization for F-22 aircraft via incremental capability The U.S. Air Force MQ-9 Reaper UAS
upgrades and reliability and maintainability improvements. It also continues devel- program is comprised of an aircraft seg-
opment and testing of advanced air superiority capabilities to include integration of ment consisting of aircraft configured with
AIM-120D and AIM-9X air-to-air missiles, additional electronic protection, and an array of sensors to include day/night
improved geolocation. The program completes fielding of Increment 3.1, enhancing full-motion video (FMV), signals intel-
Global Strike capabilities such as Small Diameter Bomb I, synthetic aperture radar ligence (SIGINT), and SAR sensor pay-
(SAR), and geolocation. FY 2018 funding requested is $915.5 million, up from loads, avionics, data links, and weapons;
$704.4 million in the FY 2017 request. a ground control segment consisting of
a launch and recovery element; and a
Unmanned platforms mission control element with embedded
The U.S. Air Force MQ-1B Predator and the Army MQ-1C Gray Eagle unmanned line-of-sight and beyond-line-of-sight
aircraft systems (UASs) are comprised of aircraft configured with a multispectral communications equipment. The FY 2018
targeting system (electro-optical, infrared [IR], laser designator, and IR illuminator) program funds the continued develop-
providing real-time full-motion video, weapons, data links, and ground control stations ment, transformation, and fielding of
with communications equipment providing line-of-sight and beyond-line-of-sight con- Reaper aircraft and ground stations. The
trol. The FY 2018 program calls for funding the test and evaluation efforts associated base request includes the procurement
www.keiconn.com
800-325-0534
[email protected]
Visit us at Space Tech Expo in May at booths
3014 and 8030
Innovative Solutions
Reflective Memory
Peer to Peer transfers
Standard and Shared Memory transfers
custom products
multiservice operational test and evaluation (MOT&E); automatic fire extinguishing the areas of training devices: command,
system (AFES) test; and command, control, communications, computers, intelli- control, communications, computers,
gence, surveillance, and reconnaissance (C4ISR) test. FY 2018 funding requested is intelligence (C4I) obsolescence; reli-
$1.142 billion, up from $775.8 million in the FY 2017 request. (Figure 2.) ability, capability, and performance deg-
radation; safety; and operational-related
issues. It also provides for the fielding
of a 30 mm weapon system. FY 2018
funding requested is $178.2 million,
down from $735.4 million in the FY 2017
request.
› Figure 2 | The Joint Light Tactical Vehicle on the production line at Oshkosh Defense.
Photo courtesy of Oshkosh Defense.
port. It also provides for initial spares,
which support the ACV Increment 1.1
program. Milestone C is scheduled in
The Armored Multi-Purpose Vehicle (AMPV) will replace the M113 Armored Personnel FY 2018. FY 2018 funding requested is
Carrier program that was terminated in 2007. The FY 2018 program funds engineering $340.5 million, up from $158.7 million in
and manufacturing development (EMD) prototype testing (including performance and the FY 2017 request.
reliability testing), completion of the interim design review (IDR) and functional con-
figuration audit (FCA), continued development of logistics support products, procure- Shipbuilding and maritime systems
ment of live-fire test assets, and procurement of 107 LRIP vehicles. FY 2018 funding Funding slated for major shipbuilding and
requested is $674.4 million, up from $184.2 million in the FY 2017 request. maritime systems totals $30.4 billion
under the DoD FY 2018 acquisition fund-
The Family of Heavy Tactical Vehicles (FHTV) consists of the Palletized Load System ing request, an increase of $3.4 billion
(PLS) and the Heavy Expanded Mobility Tactical Truck (HEMTT). The FY 2018 program over the FY 2017 request.
calls for funding the procurement of 621 FHTVs, as well as trailers to modernize the
heavy tactical vehicle fleet for the active, National Guard, and reserve units as well as The shipbuilding portfolio for FY 2018
to fill urgent theater requirements. FY 2018 funding requested is $118 million, up from includes funding for the construction
$57.1 million in the FY 2017 request. of 12 ships (two SSN 774 Virginia-class
nuclear attack submarines; one CVN 78
The M1A2 Abrams is the Army’s main battle tank, first entering service in 1980; it Gerald R. Ford-class aircraft carrier; two
was produced from 1978 until 1994. Since then, the Army has modernized the M1A2 DDG 51 Arleigh Burke-class destroyers;
with a series of upgrades to improve its capabilities, collectively known as the System one Littoral Combat Ship (LCS); one
Enhancement Package (SEP) and the Tank Urban Survival Kit (TUSK). The FY 2018 Fleet Replenishment Oiler; one Towing,
program funds the upgrade of 56 M1A1 vehicles, variants to the M1A2 SEP v3 Salvage, and Rescue [T-ATS(X)] ship;
variant. Also requested: Continued support of the engineering change proposal (ECP) one landing craft and three ship-to-
1A installation of M1A2SEP v3 production in FY 2018 as well as numerous approved shore connectors; and the second year
modifications to fielded M1A2 Abrams tanks, including the Ammunition Data Link (ADL) of incremental construction funding for
to enable firing of the Army’s new smart 120 mm ammunition, Low Profile Commander’s one amphibious assault ship, the USS
Remote Operating Weapon Station (CROWS), and Active Protection System. FY 2018 Bougainville (LHA 8). In addition, the
funding requested is $1.213 billion, up from $898.7 million in the FY 2017 request. FY 2018 request contains funding for
advance procurement to support detail
Stryker is a 19-ton wheeled armored vehicle that provides the Army with a family design activities and long-lead items
of 17 different vehicles (10 flat bottom and seven double V-hull). The FY 2018 pro- for the Columbia-class Fleet Ballistic
gram for the Stryker funds ECP 1 testing, ECP 2 lethality upgrades, and continued Missile Submarine (SSBN) and a long-
support of the application of multiple fleetwide modifications. Modifications address lead item for the refueling and complex
The CVN 78 Gerald R. Ford-class ships The Littoral Combat Ship (LCS) is a small surface combatant capable of operations
will include new technologies and close to shore. The FY 2018 program funds construction of one LCS seaframe,
improvements to improve efficiency and outfitting, trainers, and development costs for a new class of small surface com-
operating costs as well as reduced crew batant. FY 2018 funding requested is $1.152 billion, down from $1.598 billion in the
requirements. These ships will be the FY 2017 request.
premier forward asset for crisis response
and early decisive striking power in a The Virginia-class submarine is a multimission, nuclear-powered attack submarine.
major combat operation. The FY 2018 The FY 2018 program calls for funding two ships as part of a multiyear procurement
program funds the first year of construc- contract, advance procurement for two ships in future years, and outfitting and sup-
tion costs for USS Enterprise (CVN 80); port equipment. It also continues funding the development of the Virginia Payload
the final year of construction costs for Module, technology, prototype components, and the systems engineering required
USS John F. Kennedy (CVN 79); plus for design and construction. FY 2018 funding requested is $5.546 billion, up from
outfitting, training, and continued devel- $5.322 billion in the FY 2017 request.
opment of ship systems. FY 2018 fund-
ing requested is $4.638 billion, up from The Columbia-class ballistic missile submarine is designed to replace the current
$2.791 billion in the FY 2017 request. Ohio class of SSBN. The FY 2018 program funds advance procurement for long-lead
items, detail design, and research and development of nuclear technologies and
The DDG 51 Arleigh Burke-class guided ship systems such as the propulsion system, combat systems technology, and the
missile destroyers provide a wide range of common missile compartment. FY 2018 funding requested is $1.884 billion, up from
warfighting capabilities in multithreat air, $1.864 billion in the FY 2017 request.
surface, and subsurface environments.
The FY 2018 program calls for funding USS America-class ships are large-deck, amphibious assault ships designed to land
two Flight III DDG 51-class destroyers and support ground forces. The FY 2018 program continues construction funding
as part of a multiyear procurement for of LHA 8, outfitting costs, and continuing research and development efforts.
10 ships from FY 2018 to FY 2022, outfit- FY 2018 funding requested in this area is $1.748 billion, up from $1.648 billion in the
ting costs, and continued development FY 2017 request. MES
Videocentric
ISR missions
push rugged
computing
to the limits
By Mariana Iriarte, Associate Editor
The 721st Communications Squadron provides monitoring of the nation’s strategic missile-warning systems to
ensure a constant flow of key information. Photo courtesy of the U.S. Air Force/Airman 1st Class Krystal Ardrey.
Intelligence, surveillance, and reconnaissance (ISR) missions put extreme performance demands on data servers,
as they struggle to contend with large amounts of video and data coming in while hewing to strict size, weight, and
power (SWaP) constraints. Even as SWaP dominates the conversation, though, designers are beginning to realize that
performance eclipses nearly everything else.
ISR missions are bringing in all kinds of a focus on size and weight, we’re not
actionable data, but not without pushing seeing such a focus on power anymore;
the high-power/high-performance what we are seeing is a strong push
servers to the limit. “Our military has towards performance. Our customers
the tremendous capability to gather are really, really, starting to push the
the world’s best intelligence, but the boundaries with technology and where
hardware and software applications that it’s going, therefore we need to have
really need to do this collection of infor- the highest-performance systems in the
mation in real time are really pushing field. This is really driven primarily by the
COTS [commercial off-the-shelf] prod-
ucts to the limits,” says Jason Wade,
president of ZMicro in San Diego.
need to gather some deep intelligence
out in the field.” › Figure 1 | Systel’s EB7001 is
rugged small-form-factor embedded
video capture system for intelligence,
surveillance, and reconnaissance (ISR)
Performance means that the server needs applications. Photo courtesy of Systel.
SWaP: The P stands for performance to be able to handle video processing,
The commercial technology revolution data processing, storage, even live video marketing manager at Systel in Sugar
is undoubtedly affecting military tech- streaming, all of which needs to be in a Land, Texas. An example of the small form
nology, and the focus is definitely “SWaP, small package. “We are seeing more factor is Systel’s EB700 (Figure 1). “It’s a
SWaP, SWaP. How do you reduce size, and more small-form-factor embedded rugged high-performance small-form-
weight, and power?” Wade asks. “What systems for applications like on air- factor embedded system that provides
we’re seeing is that the SWaP acronym craft or Humvees, ground vehicles, and video processing, compute, encoding,
might still be valid but the definition has UAVs [unmanned aerial vehicles], where storage, and networking capabilities in a
completely changed. While there’s still space is an issue,” says Aneesh Kothari, single system,” Kothari says.
Leveraging standards
The warfighter – looking to gain an
edge by streaming video and processing
Serving up multiple live video streams data in real time – is increasingly finding
With increased demand for more “eyes in the sky” to gather intelligence, “video is that open standards can ease the way.
playing a much more vital role and will continue to do so going forward,” Kothari says. “Increased display resolutions are driving
“What we really see is this push towards everything to be very videocentric. This leads the video processors to move more and
to managing increased data volume, bandwidth issues, and the challenge of being more data quickly,” says Steve Motter,
able to accurately and consistently stream live video feeds from various platforms in vice president of business develop-
the battlefield to command and control headquarters to then be able to make real- ment at display provider IEE in Van
time decisions.” Nuys, California. “The open standards
are driving video protocols at several
This push for a videocentric world brings latency issues. “It does no one any good levels. Within the devices, there are
if you have these video feeds streaming in and you’re not seeing the video till a few newer internal video standards, such
seconds after the fact,” Kothari says. “Therefore, you really have to minimize that as MIPI and eDP, that directly link the
latency, which is hard at high bandwidths and high resolution. “ silicon processor to the LCD row/column
driver circuits.”
In order to deliver that high resolution and capability in real time, companies are
taking a deep dive into the design process. “When they’re developing this software, Engineers are leveraging everything at
they’re not looking at, ‘How do we keep this power down?’ They’re not looking at their disposal to take this technology
the hardware limitations, what they’re really looking at is the limitations of technology to the next level. “Between embedded
that’s out there,” Wade explains. In response to this need for power, “they’re using computer products, we are seeing high-
high-end gamer GPUs [graphics processing units], the latest Intel CPUs [central pro- speed serial digital interfaces, such as
cessing units], the latest multicore processors.” SMPTE-292, become more common re-
placements for legacy video interfaces,”
There is a “significant interest in general-purpose processing and virtualization,” says Motter adds.
Jim Shaw, executive vice president at Crystal Group in Cedar Rapids, Iowa. The reason
for this increase is because “the platforms that are in demand continue to push the They are also looking to fiber optics that
edge for CUDA cores or CPU cores. Much of the core cycles being expended focus enable better performance: “In the aero-
on analyzing large amounts of data or creating virtual machines to spin off processes space community, ARINC-818 is offering
for control or communication.” (Figure 2). high-speed serial on either copper or
fiber optic, allowing for lightweight long advances, however, comes the reality of but at the end of the day, that’s our job,”
cable runs,” Motter adds. “Although increased thermal challenges and pack- Wade states.
not an open standard, GigE Vision may aging difficulties.”
make inroads for a switched, packet- Powerful CPUs and GPUs are certainly
based video transport. ARINC-661 is an Thermal challenges magnified posing a challenge: “From a core and
example of a mechanism to manipulate Designing in the latest technology means rackmounted server perspective, the
pre-ertified graphic display elements that engineers are pushing the thermal power dissipation per core continues
located in a display’s local library by a threshold in systems. For example, de- to drop; however, the core count per
remote user application.” signers at ZMicro are starting to “load CPU is increasing at a significant rate,”
in multicore CPUs ... I think we’re now Shaw says. “What used to be an eight-
GPUs and CPUs are also popular: “More selling 16-core Xeons dual-socketed,” to 12-core system dissipating 80 watts
and more we are seeing customers Wade says. is being replaced with silicon that has
wanting to integrate GPUs and higher- 24 cores, and is dumping 150 watts of
end CPUs within a closed environment, What does that mean for the engineer? heat into a socket. With a dual-socket
which bring thermal concerns to the It means 300 watts of CPU power to motherboard, this equates to 300 watts
forefront,” Kothari says. contend with. “Then we’re putting in that needs to be dissipated in 1U space.”
these high-end gamer GPUs, which adds
Ultimately, data is at the center of every- another 250 watts. Now with just CPU “As computing becomes more dense,
thing. “The latest Intel Xeon Skylake and GPUs, we’re pushing 550 watts of our engineers must think outside the
architectures are demonstrating excep- processing. It’s a serious engineering box to find ways to address thermal con-
tional advancements in state-of-the- challenge to figure out how to keep cerns,” Kothari notes. This also means
art computing,” Shaw adds. “With these those computers and those servers cool, working with the user during the design
Hardware security is a relatively new arena: After all, no one the current server or system won’t be able to boot up. That’s
ever expected the adversary to able to hack into servers via kind of one of our approaches towards ensuring data security
a microcontroller or a line-replaceable unit (LRU). In the past, in the product line moving forward.”
hardware security for a server meant locking up all that valu- “Fortunately now there have been transitions and changes in
able data with an actual lock and key. technology that have self-encrypting drives, which are sup-
Interestingly enough one of ZMicro’s first product launches ported in all of our removable hard drives, but the idea behind
was “specifically for data security,” says Jason Wade, presi- it is there are industry groups that support various standards,”
dent of ZMicro in San Diego. “This was back in the ‘80s, so Wade says. “Opal 2.0 and self-encrypting drives are pretty
data security meant pulling it out of a computer and locking it much the standard in the industry right now to ensure that
in the safe at night.” data is encrypted as it’s written to disk.”
That method is still used today, but more sophisticated forms In addition, engineers at Systel “can design servers to the red/
of security are now available. “We manage data security black security enclave architecture with isolated domains to
through what comes on the SSDs [solid-state drives] we buy,” ensure security,” Kothari explains. “In effect, two separate
says Aneesh Kothari, marketing manager at Systel in Sugar computing systems are housed in the same enclosure with
Land, Texas. In fact, he adds, “Most commercial SSDs do not the utmost care taken to partition based on classification
offer any security. But the majority of industrial SSDs offer levels and prevent any information or signal leakage between
AES-256 encryption and/or zeroization (the ability to erase the two.”
sensitive information in the event the equipment is compro-
mised; FIPS 140-2 standard). In other words, we spec in the Many options exist to ensure security. Jim Shaw, executive
components that offer the appropriate security level that the vice president at Crystal Group in Cedar Rapids, Iowa, says
customer requires.” that “Most server-class architectures come with the capa-
bility to add Trusted Platform Modules (TPM), which provides
Hardware security is not an easy fix, so “From a mechanical a dedicated microcontroller designed to secure hardware by
perspective, we provide locking mechanisms on the must- integrating cryptographic keys into the motherboard system.”
have removable hard drives and have even installed ‘locking Crystal Group offers products that “also provide the capability
bars’ over some hard-drive carriers,” Kothari adds. to secure erase drives by selecting FIPS-compatible drives
Moving forward, some industry experts are adjusting to meet and enable line options. Customizing the I/O with mil-spec
a user’s security requirements. “In our upcoming products, circular connectors and limiting intrusion points is one of the
we have the capabilities for users to support embedded elec- most useful approaches to limiting unwanted access to a net-
tronic serial numbers, so that way they can create their own worked server. Beyond these options, tamper-proof screws
security protocols,” Wade states. The beauty of this method and chassis-intrusion monitors are reasonable hardware
is that “Hard drives that aren’t authorized to be connected to methods of maintaining a secure server system.”
Performance
increases still
needed for full
adoption of
mobile rugged
computing for
military use
By Mariana Iriarte, Associate Editor
The crew for an RQ-4 Global Hawk is shown using mobile-computing technology to review technical orders and
prepare the unmanned aircraft system (UAS) for launch. Photo courtesy of the U.S. Air Force/Staff Sgt. Bennie J. Davis III.
The constant drive forward in These types of capabilities are what military users are looking for “in their rugged mobile
commercial technology is also driving devices,” Motter adds. “The innovations and advances achieved in the consumer
space are tremendous; we should similarly enable and equip warfighters. We should
military-computing technology to
build a framework [in the industry] that rewards invention.”
new heights. As this progress occurs,
mobile computing is becoming more Commercial offerings are still beyond anything the warfighter can experience today,
relevant to the warfighter, while at the however. “Tablets continue to be constrained by battery power, thermal limitations,
and an insatiable demand for more processing,” points out Jim Shaw, executive vice
same time posing huge challenges
president of engineering at Crystal Group in Cedar Rapids, Iowa. With an increase in the
for designers and engineers. Even use of smaller computing devices, and as more battlefield applications get deployed on
as engineers deal with shrinking tablet-like devices, Shaw says, “processing demand increases accordingly.”
size and weight requirements,
At the core of what will drive the true adoption of mobile laptops and tablets in the
performance is still a big issue that
field: raw performance capabilities. “The designer (and the customer that selects the
mobile computing doesn’t quite appropriate device) is challenged to select a device with the maximum performance
answer for military use. (processing speed, connectivity, display, and peripheral, etc.), while still low-power
enough that the device will operate (in the rugged environment) long enough to
achieve the mission parameters,” Motter explains. “There should also be adequate
“Today’s soldiers and military personnel reserves to handle contingencies and unexpected emergencies, often encountered in
have device performance and operation the dynamic fielded operation.”
expectations set by the latest tablet and
smartphone devices,” says Steve Motter, “While rugged tablets are becoming more and more powerful, they are of course still
vice president of business development not able to process as much information as a traditional server (Intel Core CPUs versus
at display provider IEE in Van Nuys, Xeon, for example),” adds Aneesh Kothari, marketing manager at Systel in Sugar
California. “Extremely high-resolution Land, Texas. “That being said, tablets are still able to perform many of the same tasks
touchscreens (beyond full HD) are com- at a much lower price point. Between pricing and much smaller footprints, rugged
monplace [in consumer applications], mobile solutions are extremely attractive for the military.”
with interoperable applications, com-
mon user interfaces, and dependency Traditional servers were not designed to run on batteries, explains Jason Wade,
on networked information” president of ZMicro in San Diego. In addition, “the power requirements or the power
That still doesn’t change the reality that “the processing isn’t necessarily going to be
taking place on the mobile-computing solution, just because there is such high-end,
backend server processing that’s still required for collecting the data, analyzing the
data, and distributing the data,” Wade clarifies. “I think it’s kind of a synergistic role
between the two platforms, the mobile and the server platform. I think that as the
power of mobile computing goes up, so will the backend processing that will feed that
information out to the server. There’s a pretty dramatic difference.”
What end users are currently seeing is “several key manufacturers that are producing
families of multicore processors around scaled performance; from the extreme
low-power ARM processors, to midrange power Atom x86 devices, to the latest-
generation i7 workhorses,” Motter explains. “In the rugged embedded space, there
are wide-temperature-range, controlled- (lower) power variants of each of these that
lend themselves nicely to rugged embedded mobile computing.”
Wade says he thinks that talking about mobile computing in the same terms as tradi-
tional servers is a little bit premature: The benefits that tablets and laptops bring to the
Integrated panel
PC solves many
challenges in
limited-space
battlefield
applications
By Chris Ciufo
The interior of this Stryker armored vehicle appears to have loads of space, but vetronics computer chassis are
stuffed into every cranny, including panel PCs and displays. Other Stryker variants have human-machine interfaces (HMIs)
on either side for squad and commander use. (Image courtesy of Wiki Commons; used under open source license.)
The modern battlefield depends on equipment that enhances the vehicle’s battlefield utility and interoperability versus
computers on the move. While the prac- that equipment taking up space at the expense of personnel comfort and amount of
tice of embedding a range of rugged crew and gear that can be carried?
computers into military vehicles is well-
established, the human-machine inter- Reducing individual chassis size is an option for freeing up space. Another is com-
face (HMI) for these systems presents bining more functions into each box to reduce the total number of vetronics chassis.
new challenges, especially with the need Taken even further, since the HMI must remain – it can’t be eliminated – why not move
for real-time, high-definition video. A a whole vetronics box inside the HMI itself?
vehicle such as a Stryker personnel car-
rier, for instance, may contain multiple A panel-PC-style “smart display” that integrates a vetronics chassis and computer
systems for communications, weapons subsystem and display into a single, rugged, application-tailored form factor is an
control, identification friend or foe (IFF), ideal option for these mobile applications. These smart displays can reduce the total
battlefield mapping, inertial navigation, space required for separate computer and display, and can be networked so that a
and more, and many of those systems single smart display interfaces with multiple systems.
require a display as part of the human-
machine interface. In Figure 1, the General Micro Systems architecture shows one or more computers
feeding purpose-built HMIs. Merely integrating each HMI’s computer into the display
The Stryker appears to have more inte- chassis itself will free up space in the vehicle, but that move changes a few things:
rior room than a Humvee, mine-resistant We’ve moved some of the heat load from a separate box into the display, created
ambush protected (MRAP) vehicle, or some new HMI mounting challenges to remove that heat, and possibly wreaked havoc
Apache cockpit to incorporate all those with the cabling.
systems, but that space fills up quickly.
Moreover, while rugged embedded com- The upshot is that while an integrated panel PC will free up space, the designer needs
puters can be tucked into every available to pay attention to these three challenges:
nook and cranny, the HMI displays to
interact with them must be easily acces- ›› HMI heat dissipation
sible by onboard personnel. Yet what’s ›› HMI mounting for cabling and usability
the tradeoff between more computer ›› Video or local-area network (LAN) integration between multiple or “slave” displays
› Figure 2 | This modular smart display from General Micro Systems offers flexible mounting
options and conduction cooling, and allows a single display to support multiple computer
systems, or to daisy-chain to other smart displays.
heat to a minimum. At the same time, the display must be designed to be as thin as
Integrated computer and display possible to reduce its footprint – there’s no room inside a vehicle for a display that is
bring new heat-dissipation challenges five inches thick due to a bulky heatsink.
Soldiers commonly refer to computers
in vehicles as “personnel heaters.” For An ideal approach to cooling the whole HMI starts at the hottest point: the CPU and/or
missions in snowy areas, that warmth video processor. Here, a high-efficiency conduction heat sink can be used that’s com-
might be appreciated, but recent wars posed of a corrugated alloy slug with an extremely low thermal resistance. This acts as
are primarily being fought in deserts; a heat spreader at the processor die (see Figure 2). Once the heat is spread over a large
the last thing warfighters need are addi- area, a liquid silver compound in a sealed chamber transfers the heat from the spreader
tional heat sources inside the confined to the systems’ enclosure. This approach yields a temperature delta of less than 10 °C
spaces of military vehicles. This reality from the CPU core to the cold plate, compared with more than 25 °C for typical systems.
means that convection cooling is a non- In this manner, the increased heat load of the computer plus HMI is quickly conducted
starter. Fans would simply blow hot air to the vehicle’s cold plate, while keeping the whole HMI extremely thin.
into the vehicle and grit and dust into
the computer, making these mechanical Another advantage of this hot-spot approach is the effect on shock and vibration.
elements a source of discomfort for sol- Because the CPU die does not make direct contact with the system enclosure, but
diers and a significant point of failure for rather connects via a liquid silver chamber, that acts as a shock absorber that saves
the embedded computer. the processor from microfractures that can cause failure.
Integrated smart displays, therefore, Mounting options require flexible, customizable design
must use conduction cooling, which can Computer systems inside military vehicles often require creative mounting options to
still dump hundreds of watts of heat onto make the best use of limited space for equipment and personnel. While embedded
the “cold plate” – the metal shell of the computers can be tucked out of the way, the challenge for displays is mounting them
vehicle. That will still eventually heat the with appropriate viewing capability for operators to manage weapons control, mon-
interior, so smart displays – which now itor maps, examine video, and more.
include a full-featured vetronics com-
puter such as a mission processor – must Smart displays can be bulkhead-mounted (cut into the vehicle’s wall) or surface-mounted
also use highly efficient design and low- on the wall; can fold down from a ceiling mount; or can be installed on a swing arm. Each
power electronics to keep dissipated of these options requires a different cable output location – out the back, from the top
or bottom, or right or left side. A modular design approach to the smart display enables This standard enables video to be
the cable location to be easily adapted to any configuration requirement. routed to multiple displays within a
vehicle – or from a camera outside the
Consumer video interfaces not up to the task vehicle to the display – without running
Cables present additional challenges, however. Even though a vehicle is a relatively additional cables between systems. A
small area, displays and the systems they are connected to may not be mounted setup using an integrated smart display
close together. In some applications, an operator may need to share information with and network server is also possible,
another operator’s screen. For instance, if one operator receives thermal imaging or which would provide a backbone for
moving map data from an unmanned aerial vehicle (UAV) over the battlefield, the digital switching of video data from a
operator may need to share that information with a gunner or tactical platoon leader central, compact workstation.
located on the other side of the vehicle.
Another way to route video between
Cabling may need to snake as much as 20 feet around the inside of the vehicle perim- master and slave displays is by daisy-chain
eter rather than taking the shortest distance. Video quality breaks down over these method; however, most civilian commer-
long distances using typical video interfaces such as HDMI or DisplayPort. Another cial off-the-shelf (COTS) video standards
factor: The electromagnet interference (EMI) from the vehicle’s engine and alternator are not up to the task. Fortunately, the
can also affect performance, which can hamper the safety and efficiency of the soldiers Society of Motion Picture and Television
in the vehicle. Engineers (SMPTE) has developed high-
performance standards for long cable
One way to deliver video is digitally over a LAN. For some implementations, a single runs. High-definition serial digital inter-
display can provide the interface for multiple computer systems. Packetized video is face (HD-SDI) is standardized in SMPTE
efficient and can be delivered over long runs using video protocols as long as each 292M, which supports uncompressed
HMI includes 1 GbE or 10 GbE [Gigabit Ethernet] network interfaces up to the task. video streams at full high-definition rates
that can run over hundreds of meters
GigE Vision is a high-performance interface standard designed for industrial cameras with no quality degradation. These
that transmits high-speed video and related control data over Ethernet networks. cables can also be used to connect cam-
eras outside the vehicle to computers
and displays inside, or to daisy-chain
Chris A. Ciufo,
the CTO of General
Micro Systems, is a
Stay ahead with veteran of more than
IC proven solutions three decades of the
embedded systems
and semiconductor
Embedded SBCs based on the latest Intel® industries. Ciufo brings extensive
and NXP platforms and offering multiple I/O, experience working with government
to secure your critical computing application needs. program offices and prime contractors
for M1A2 and M2A3 (Army), F14D
(Navy), AAAV (USMC), and B-2 (USAF).
Ciufo holds degrees in electrical
engineering and materials science
www.interfaceconcept.com from the University of California.
Please contact Elma Electronic Inc. for further information on these products
www.elma.com • [email protected] • 510-656-3400 General Micro Systems
www.gms4sbc.com
Cyberwarfare:
A “Wild West”
of nonkinetic
weaponry
By Sally Cole, Senior Editor
The term cyberwarfare is so ambig- command, control, communications, computers, intelligence, surveillance, and recon-
uous – a solid definition that everyone naissance (C4ISR) in military operations.”
can agree on remains elusive – and there
is certainly no accepted set of rules to “Wild West” in terms of lack of rules and laws
follow ... yet. So far, no treaty provisions deal specifically with cyberwarfare. “NATO produced the
Tallinn Manual in an attempt to provide direction and guidance, but it’s a nonbinding
It tends to focus on “intentionally break- study,” points out Neil Haskins, general manager, Middle East, for IOActive.
ing or damaging the software that a
critical system depends on to function so Once you begin developing capabilities that fit the description of a cyberweapon, “it
that it’s no longer functional or capable must meet guidelines that we as a nation agree are appropriate – the weapon needs
of carrying out its intended use,” says Bill to be legal and not indiscriminately kill or cause civilian populations undue harm,”
Leigher, director of Raytheon’s govern- Leigher says. “It must be possible to responsibly control it, and a commander who
ment cybersecurity solutions business uses it needs to have an understanding of the limits of its power and what really hap-
and a retired U.S. Navy rear admiral. pens once they use it in a combat situation. This starts to define the nature of cyber-
Cyber and other nonkinetic capabilities weapons, and I think it needs to meet the same standards the International Law of War
“are an emerging class of weapons that demands. But we’re not really there from in a mature way from a cyber perspective.”
will eventually mature and make their
way into the arsenals of commanders.” Cyberwarfare is evolving in a variety of intriguing ways. It used to be “nation-states
squaring off against other nation-states with their own hacking teams,” says Dennis
These noncombat attacks are used to Moreau, senior engineering architect, networking and security, for VMware. “That’s
“deny, deter, disrupt, or delay elec- not what we’re seeing now. Cyberwarfare is being conducted in more of a guerrilla
tronic communications of infrastructure, warfare domain where attackers use proxies to maintain a level of plausible and dip-
public confidence, or military technolo- lomatic deniability. But the victim is clearly a national interest, and we’re seeing these
gies used to support combat opera- attacks across the very broad spectrum of their interests. Attackers are using every bit
tions,” explains Bryan Singer, director of the technical sophistication developed by nation-states, including the U.S.”
of Industrial Cybersecurity Services for
security firm IOActive. “The intent of Deniability extends “not just to the malactors but also to the targets. For example, the
these cyber operations is to enhance attack on the Democratic National Committee, which the U.S. maintains didn’t reach
the ‘fog of war’ against enemy nation the level of being cyberwarfare,” Moreau points out. “Yet, right now NATO is wrestling
states to impede their ability to support with the question: Does a cyberattack against critical infrastructure trigger Article 5
Not quite so clear is what exactly the The availability of “very high-end exploits and techniques” that don’t require the users
U.S. is capable of in terms of cyber- to be rocket scientists are enabling record-setting attacks such as “a 600-Gbit DDoS
warfare, because “very few people carried out by leveraging compromised webcams,” Moreau notes. “Sophisticated
on the planet have accurate, detailed malware becomes a tool that can be used without much capital investment or infra-
information about the true adversarial structure, which effectively levels the playing field in terms of who can inflict devas-
digital capabilities of the U.S.,” says tating levels of disruption.”
Brad Hegrat, practice director, Advisory
Services, for IOActive. Cyberwarfare tends to be a “passive-aggressive style of conflict,” according to Hegrat.
“It’s equally suited to the removal of the enemy’s desire and ability for conflict. The
Cyberwarfare targets aggressor in any scenario may have many goals and, like many nuanced campaigns,
What’s being targeted with cyberwar- multiple fronts. On the ‘desire’ front, the focus would likely be on digital targets with
fare? Ukraine seems to be providing the greatest physical and psychological impact. Attacks that disrupt people’s lives
a clear example of how things might could range from catastrophic – power, water and wastewater, communications, and
play out, Moreau points out. “Since banking – to inconvenient.”
2015, with the efforts of BlackEnergy
and TeleBots, we’ve seen distributed From a military standpoint, there is “little to no impact for operations across this spec-
denial of service (DDoS) attacks front trum,” Hegrat says. “This speaks to the ‘ability’ front. To deny an enemy the ability to
and center there for denial of services wage conflict, targeting must focus on that enemy’s digital backbone. For example,
of all sorts,” he says. “We expect to see the U.S. intelligence community refers to its own backbone as C4ISR capabilities. In
information theft, especially logistical targeting adversaries, removing the ability to engage in conflict doesn’t always need
and deployment information directly to be kinetic; the use of the cyber battlespace to deny adversarial use of its own C4ISR
related to the military. But also expect to capabilities is the ideal use of this front.”
see more strategic attacks, discovering
and closing arms gaps, understanding Cyberwarfare attacks
defense posture, and strategic planning The types of cyberwarfare attacks launched depend largely upon targets and objectives.
sorts of attacks.”
Haskins categorizes them as advanced disruptive attack vectors. “If the aim is sabo-
Even more so, expect “disinformation tage, for example, it could be something like targeting the opposition’s ability to
attacks to influence decision making by generate power through a malware-based attack or disrupting normal function of a
corrupting the intelligence or creating vital government or financial website with a DDOS attack. Alternatively, if the objec-
‘intelligence fog.’ In Ukraine, we’re see- tive is espionage, the acquisition and exfiltration of an opposition’s tactical or strategic
ing a complex broad-sweeping stroke information – such as troop movements – could be the result of sustained phishing,
that is the difference between the clas- social engineering, or malware-enabled attacks.”
sical view of cyberwarfare and what we’re
seeing today,” Moreau continues. “I think The “sky is the limit” for attacks, adds Singer, although he doesn’t dismiss sky-based
we’ll see that full spectrum form of war- threats, which are all too real. “Low-intensity conflict or noncombat operations will
fare – well beyond just turning off lights likely see attacks ranging from low-order denial-of-service (DoS) and psychological
or interfering with the national gas.” operations (PSYOPS) to harassing infrastructure, such as events that have occurred
in Ukraine. Combat operations could see similar attacks as well, ranging up to elec-
Not surprisingly, targets are continuing tromagnetic pulse (EMP) threats from ballistic missiles to pre-positioned satellites in
to expand. “In a lot of ways, what we’re space,” he says.
What kinds of cyberwarfare might we see? The types of things Leigher worries
Some attacks will be blatantly obvious, but many are often stealthy and never about in this scenario include being
acknowledged. able to do “the targeting that allows me
access to a processor in an adversary’s
In a war scenario, if you wanted to go after the U.S. banking structure, “you could aviation squadron maintenance shop so
figure out where a bank’s primary data centers are, for example, and lurk off the coast that when the next aircraft is connected
of the U.S. and launch a cruise missile to target and destroy them,” Leigher notes. “Or to its maintenance console malware
you could do the same thing with cybertargets much more subtly by learning how to gets uploaded,” he says. “The next time
get access to their network and taking control of the facility by either subverting its or 15th time it flies, the pilot will get a
software or causing things to happen within the computing system that will flat-out warning that causes them to question
break the computers. When you’re at war with a nation, we need to acknowledge that the material condition of their aircraft so
these two actions are fundamentally equivalent.” they can’t fly it anymore. Or malware that
targets the engineering plant on a ship,
because if a ship can’t make electricity
its combat systems won’t work. The ship
may go through the water, but it won’t
be an effective warfighting platform.”
System resilience The idea of system resilience needs to become a first-class part of software design,
One way to protect U.S. infrastructure right up there with performance, efficiency, and cost-effectiveness, Moreau says.
and military assets is by focusing on “It doesn’t happen by accident,” he adds. “It happens by intention and focused
system resilience. Much of the cyber action, so we need to cultivate a development culture that embraces resilience. The
security discussion today centers on pro- good news is that emerging technologies are creating the opportunity to do just
tecting networks, smarter passwords, that. Software-designed infrastructure, application/service blueprints, containers,
better firewalls, and technical things, as and API [application program interface] brokering, virtualized security techno-
Leigher points out, but we’re not dis- logies, distributed scalable analytics, and granular instrumentation all are enablers
cussing the systems that are connected of simpler, more effective security that’s ‘designed in’ rather than ‘bolted on’ after
to our networks enough. the fact.” MES
Establishing
a root of trust:
Trusted computing
and Intel-based
systems
By Steve Edwards
Advanced weapons systems – like that in the F-16 Fighting Falcon aircraft – rely on complex software that is
constantly vulnerable to cyberattacks. In this photo, a U.S. F-16 Fighting Falcon flies towards Rimini, Italy, to join
the Italian air force on a training mission. U.S. Air Force photo by Tech. Sgt. Dave Ahlschwede.
In the global defense-electronics market there is a growing demand for trusted computing solutions that carry
effective protections against cyberattacks. Users want to be confident that when they power up their deployed embedded
system, the code that their system is running can be trusted. In this sense,“trusted” means that the system is running only
the software code that the system integrator intends it to, and that no other code – malicious or otherwise – has been
added to it.
Unfortunately, it takes almost no effort on a URL link to inadvertently install malicious code into a computer’s BIOS – the mali-
to think of recent examples where cor- cious code then essentially owns that infected system. The threat is real and demands
rupted code has caused great harm to a proactive response.
computing systems around the world.
One potent example is the WannaCry Embedded defense systems are also vulnerable to cyberattacks. In 2015, the U.S. Air
ransomware worm unleashed in May Force Scientific Advisory Board (SAB) conducted a study on “Cyber Vulnerabilities of
2017 that wreaked havoc on thousands Embedded Systems on Air and Space Systems” and concluded that “there is a broad-
of computers by encrypting their data. In based set of immediate actions that can significantly mitigate embedded system cyber
just one day, WannaCry infected 230,000 risk.” Moreover, a 2015 RAND Corp. report on “Cybersecurity of Air Force Weapon
systems in 150 countries. According Systems” concluded that cyber capabilities “create potential opportunities – and
to the FBI, ransomware is the fastest incentives – for adversaries to counter U.S. advantages through cyberattacks.” To
growing malware threat, targeting users counter the cyberthreat in its weapons systems, the U.S. Air Force established the
of all types – from the home user to the Cyber Resiliency Office for Weapons Systems (CROWS), which has the task of sup-
corporate network. On average, says the porting the design, development, and acquisition of weapons systems that are more
FBI, more than 4,000 ransomware attacks resilient to cyberattack.
have occurred daily since January 1, 2016,
a 300 percent increase over the approxi- A foundational concept in cybersecurity, and the starting point for the right response,
mately 1,000 attacks per day seen is the hardware root of trust (RoT). Such components establish trusted functions, based
in 2015. It only takes one innocent click on hardware validation of the boot process, that ensure that the device’s operating
THAN OTHERS.
the hypervisor, operating system, or BIOS; malicious root kit installations; and other launch policy, the decision to continue to
software-based attacks. run is made with the full knowledge that
the system is no longer trusted.
Intel TXT creates a cryptographic hash (a “measurement” in Intel terminology) of
critical BIOS components and compares them to a known good measurement. TXT Boot Guard works in a complementary
provides hardware-based enforcement mechanisms to block the launch of any code fashion to TXT. Intel describes Boot
that does not match approved code. This trust can then be extended all the way Guard as “hardware-based boot integ-
through the boot loader and into the operating system. Any error in the code will be rity protection that prevents unauthor-
detected and addressed according to the launch control policy (LCP) established by the ized software and malware takeover of
user. Because TXT provides the system integrator with a launch control policy, a notifi- boot blocks critical to a system’s func-
cation of corrupted code can have different consequences. After being informed that tion.” Boot Guard is a hardware trust
the system has been modified and is no longer trusted, the user can choose to either system that inspects an initial boot
continue to run or to shut down. If the system integrator has established an “open” block, which runs prior to the BIOS, and
ensures that it is trusted before allowing
a boot to occur.
Steve Edwards is
Director, Secure
Embedded
Solutions, for
Curtiss-Wright
Defense Solutions.
Steve joined the
company in 1998 in the position of
senior hardware engineer, and has since
held numerous leadership positions
including CTO for Curtiss-Wright
› Figure 1 | Intel’s 7th Generation Core processor used on select Curtiss-Wright rugged SBCs
supports TXT and Boot Guard. Image courtesy Curtiss-Wright.
INTERNATIONAL
www.phenxint.com 714-283-4800
Military Embedded Systems focuses on embedded electronics – hardware and software – for military
applications through technical coverage of all parts of the design process. The website, Resource Guide,
E-mags, and print editions provide insight on embedded tools and strategies such as software, hardware,
systems, technology insertion, obsolescence management, and many other military-specific technical
subjects.
Coverage includes the latest innovative products, technology, and market trends driving military
embedded applications such as radar, sonar, unmanned system payloads, signals
intelligence, electronic warfare, C4ISR, avionics, imaging, and more. Each issue
provides readers with the information they need to stay connected to the pulse
of embedded technology in the military and aerospace industries. mil-embedded.com
CYBERSECURITY UPDATE
Researchers in Germany have demonstrated ground-based measurements of quantum operate, which enabled them to make
states sent by laser aboard a satellite 38,000 kilometers above Earth, suggesting that quantum-limited measurements from
satellite-based quantum encryption may be within reach by as soon as five years. the ground.
Quantum entanglement, which Albert Einstein termed “spooky science at a distance,” is From their measurements, they deduced
the physical phenomenon at the heart of the demonstration by of a team of researchers that “the light traveling down to Earth
at Max Planck Institute for the Science of Light that the technology on satellites – already is very well suited to being operated as
space-proofed against the harsh environments – can be used to achieve quantum- a quantum key distribution network,”
limited measurements. They believe this puts satellite quantum networks within reach Marquardt says. “We were surprised
much sooner than anticipated and significantly reduces the development time involved. because the system wasn’t built for this.
The engineers had done an excellent job
“We were quite surprised by how well the quantum states survived traveling through of optimizing the entire system.”
the atmospheric turbulence to a ground station,” says Christoph Marquardt, group
leader of Quantum Information Processing at the Max Planck Institute for the Science Now, the researchers are working with
of Light in Germany. Tesat-Spacecom and others within the
space industry to design an upgraded
Satellite-based quantum encryption networks could provide an extremely secure way system based on hardware already used
to encrypt data sent over long distances. The researchers estimate that such a system in space. Marquardt says that while
is possible within five years, although that seems extremely fast if you consider that quantum communication satellite net-
satellites generally require roughly 10 years of development work. works won’t need to be designed from
scratch, converting ground-based sys-
Quantum key distribution encryption, instead of relying on math, taps properties of tems to quantum-based encryption to
light particles known as quantum states to encode data and send the decryption key. communicate quantum states with satel-
If anyone attempts to measure the light particles to steal the key, it changes the par- lites may still take five to 10 years. This
ticles’ behavior in a way that alerts the intended communicating parties that the key effort will involve upgrading the laser
has been compromised and should not be trusted. In other words: Eavesdropping will communication design, incorporating a
be detected, so secure communication is guaranteed. quantum-based random number gen-
erator to create random keys, and inte-
“Quantum cryptography ensures long-term security of information,” Marquardt says. grating post-processing of the keys.
“This is especially important for strategic information, but also ensures that you’re
safe against unknown threats against current encryption algorithms – apart from the The team’s work is generating “serious
quantum computer threat that will become more urgent during the next decade. And interest from the space industry and
a satellite service could connect different bases or embassies.” other organizations to implement scien-
tific findings,” Marquardt says. “We, as
To measure quantum states, the researchers worked with satellite communications fundamental scientists, are now working
company Tesat-Spacecom GmbH and the German Space Administration. The German with engineers to create the best system
Space Administration had previously contracted with Tesat-Spacecom on behalf of and to ensure no detail is overlooked.”
the German Ministry of Economics and Energy to develop an optical communications
technology for satellites. The technology they previously developed is now being It’s also worth noting that another signifi-
commercially used in space for laser communication terminals onboard Copernicus – cant advance within this realm was very
the European Union’s Earth Observation Program – and by SpaceDataHighway, the recently made by an unaffiliated team
European data-relay satellite system. of researchers from the University of
Science and Technology of China: They
Marquardt and colleagues discovered that this satellite optical communications tech- demonstrated satellite-based distribu-
nology works much like the quantum key distribution method developed at the Max tion of entangled photon pairs over a
Planck Institute. So they set out to see if it was possible to measure quantum states distance of 1,200 kilometers, which they
encoded within a laser beam sent from a satellite already in space. say now “opens the door to both prac-
tical quantum communications and fun-
During 2015 and the beginning of 2016, the team made these quantum state mea- damental quantum optics experiments
surements from a ground-based station at the Teide Observatory in Tenerife, Spain. at distances previously inaccessible on
The team created quantum states within a range where the satellite normally doesn’t the ground.”
Designers and engineers are taking technology that was once considered a
advantage of the ability of open architec- figment of the imagination becomes a
tures and commercial off-the-shelf (COTS) reality, it is clear that open architectures
technologies to counter emerging threats are readily addressing the Department
quicker by more easily upgrading legacy of Defense (DoD) demand to quickly
systems with newer, faster technology. In upgrade and stay ahead of the game.
one such project, a U.S. Navy-sponsored
program focuses on a family of robotics In the AEODRS case, the program
that will keep soldiers out of harm’s way.
Hopkins University Applied Physics Lab Increment 2, and Increment 3. The JAUS [joint architecture for unmanned
(JHU/APL) and an industry team that Increment 1 Primary System Integrator systems] expertise to JHU/APL and others
includes Northrop Grumman, OpenJAUS, program has been awarded to Northrop in the form of architecture analysis and
and GuardBot to work on the U.S. Navy’s Grumman Corp.,” Kent explains. recommendations, software develop-
Advanced Explosive Ordnance Disposal ment activities, and general consulting
Robotic System (AEODRS) program. Leveraging COTS components and open and support. OpenJAUS also provides
architectures is a big part of the program, system integration testing, evaluation,
The goal of the program is “to develop as COTS has helped the military control and support to Northrop Grumman as
modular, open-architecture robotic plat- costs, particularly during its sequestra- part of its AEODRS Increment 1 project.
forms for use in explosive ordnance dis- tion years. “Using COTS components on
posal across the U.S. Navy,” says Danny government programs such as AEODRS Under the program, OpenJAUS supplies
Kent, Ph.D., president and cofounder of enables the military to leverage the rapid software services including “integration
OpenJAUS. “By utilizing an open archi- progress being made in the robotics of hardware with the program architec-
tecture, components and modules can community,” Kent says. ture for risk reduction and development
be reused across the family of systems. In of more user-friendly interfaces to tools
addition, future technologies and capa- This is especially essential in the field of developed for testing and validation of
bilities can rapidly be brought from the robotics: “What is innovative technology the AEODRS architecture,” he adds.
research laboratory to the warfighter.” today may be obsolete in a matter of
years and sometimes months,” he ex- Robotic-vehicle maker GuardBot, with
To that end, the team announced in plains. OpenJAUS – a Florida company support from OpenJAUS, developed the
May 2017 that the AEODRS Increment 1 specializing in middleware solutions SPAAR system, which enables reconnais-
and Spherical Platform for AEODRS for unmanned systems developers – is sance in harsh environments. Engineers
Appliance Research (SPAAR) systems helping commercial companies adapt at OpenJAUS integrated the SPAAR
had completed a demonstration for Joint their technology to the AEODRS pro- architecture with the AEODRS system
Services EOD Action Officers in Indian gram at a quicker pace, lower cost, and architecture, according to a statement
Head, Maryland. While Increment 2 and at a reduced risk, Kent adds. ”By utiliz- released by OpenJAUS. The results of
Increment 3 systems are still awaiting ing OpenJAUS’s commercial JAUS and this collaboration enabled engineers
award, the U.S. Navy’s AEODRS program AEODRS software libraries, companies to integrate and demonstrate a system
aims to be “the Navy’s next-generation, jumpstart integration into the existing using “AEODRS Handheld Operator
open architecture robotic family of sys- AEODRS architecture.” Control Unit (HOCU) and the Multi-
tems,” Kent says. Robot Operator Control Unit (MOCU)
Officials consider Increment 1 as the first software application.” (See Figure 1.)
The program is capitalizing on the open of a family of open architecture robotic
architecture movement, which will help systems designed to be interoperable The end result of the SPAAR program
today’s warfighters to fight emerging and having the capability to integrate demonstrates that technology can be
threats by enabling engineers to quickly new technology quickly that will benefit more interoperable and will likely prompt
adapt new technology to current systems. the warfighter. engineers to quickly integrate new tech-
nologies into the AEODRS family, both
JHU – along with the industry team – is Kent explains that OpenJAUS’s role in of which will benefit military-sponsored
taking advantage of the movement. As the AEODRS program is “to provide our programs.
CHARITIES | MARKET PULSE | WHITE PAPER | BLOG | VIDEO | SOCIAL MEDIA | E-CAST
CHARITY
Demystifying security for military data storage High data rates over the VPX
Sponsored by Mercury Systems infrastructure
By Kontron
Modern military sensor and other high-performing processing
VPX VITA 46 has been one of the first
systems generate massive amounts of data, much of which is
modular computer open standards to
stored on solid-state drives (SSDs). While commercial off-the
define a connector and backplane infra-
shelf (COTS) SSDs can usually offer an attractive initial price,
structure allowing data transfers at rates in excess of one
use in military applications often end up requiring time and gigabit per physical channel.
work so that they can deliver the security, ruggedness, and per-
VPX is now ready to adopt the higher data rates required by
formance required for most defense applications. As a result,
the latest version of two fundamental protocols: PCIe gen3 at
the initial cost savings is lost and the added time and effort can
8 gigabits per second and Ethernet at 10 gigabits per second.
lead to blown schedules.
In this white paper, learn what designers will encounter when
This webcast will cover the differences between COTS SSDs implementing 10 gigabit per second rates over a VPX copper
and secure military-grade SSDs. Also discussed: the fact that backplane and discover some of the available architectures and
security must be embedded into the design of military systems, products.
which is the only avenue for designers to obtain the highly
Read the white paper:
desired “CSfC” listing granted by the NSA.
http://www.embedded-computing.com/hardware/
View archived e-cast: ecast.opensystemsmedia.com/747 high-data-rates-over-the-vpx-infrastructure
View more e-casts: Read more white papers: http://mil-embedded.com/
http://opensystemsmedia.com/events/e-cast/schedule white-papers
ABACO SYSTEMS: EMBEDDED IN THE WORLD’S MOST CRITICAL MISSIONS SINCE 1986.
abaco.com | @AbacoSys
©2016 Abaco Systems.
a b le:
Avail el
n
Now Chan y
2X ensit
D
Unfair
Advantage.
2X HIGHER performance 4X FASTER development
Introducing Jade™ architecture and
Navigator™ Design Suite, the next
evolutionary standards in digital
signal processing. Kintex Ultrascale FPGA
Pentek’s new Jade architecture, based on the latest generation
Xilinx® Kintex® Ultrascale™ FPGA, doubles the performance
levels of previous products. Plus, Pentek’s next generation
Navigator FPGA Design Kit and BSP tool suite unleashes these
resources to speed IP development and optimize applications.
• Streamlined Jade architecture boosts performance,
reduces power and lowers cost
• Superior analog and digital I/O handle multi-channel
Jade Model 71131 XMC
wideband signals with highest dynamic range 8-channel module, also
available in VPX, PCIe, cPCI
• Built-in IP functions for DDCs, DUCs, triggering, and AMC with rugged
synchronization, DMA engines and more options.
Navigator FDK shown in IP Integrator.
• Board resources include PCIe Gen3 x8 interface, sample
clock synthesizer and 5 GB DDR4 SDRAM
• Navigator Design Suite BSP and FPGA Design Kit (FDK)
for Xilinx Vivado® IP Integrator expedite development
• Applications include wideband phased array systems, See the Video!
communications transceivers, radar transponders, SIGINT www.pentek.com/go/mesjade or
and ELINT monitoring and EW countermeasures call 201-818-5900 for more information
All this plus FREE lifetime applications support!