500 A Huntmar Park Drive ASTi Telestra 4 Target Operation and Maintenance Manual Document: DOC-01-TEL4-TUG-1 Advanced Simulation Technology inc.
Product Name: Telestra 4 Target ASTi Telestra 4 Target Operation and Maintenance Manual © Copyright ASTi 2010-13. ASTi documents are continuously updated see www.asti-usa.com/support/document. Restricted Rights: Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013. This material may be reproduced by or for the U.S.
Table of Contents Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 1.1. Theory of Operation ............................................................................................... 2 Figure 1: Theory of Operation .............................................................................. 3 Chapter 2: System Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 2.1. Target Hardware Components ...................
3.5. Connections ......................................................................................................... 11 3.5.1. Connecting ACENet Devices ......................................................................... 11 3.5.2. Power Connection ......................................................................................... 11 3.5.3. Monitor Connection ........................................................................................ 11 3.5.4. Keyboard Connection ..............
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Chapter 1: Introduction The Target is an embedded, real-time platform, providing high-fidelity radio/communications and environmental cue modeling. The Target connects to ASTi’s flexible, networked-based ACENet architecture which provides a wide range of high-fidelity, scalable, digital 48kHz audio and I/O peripherals. With real-time performance and reliability, the Target uses the latest multi-core processing technology.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 1.1. Theory of Operation The Telestra 4 (also called a Target) is an embedded server that processes audio and communications (Number 1 in Figure 1, below). The Target runs the Red Hat® Enterprise Linux® operating system as well as a suite of custom software applications written and maintained by ASTi. 1 Audio is processed in remote units called ACE-RIUs, ACUs, or ACU2s.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) DIS 3 Host 1 Target Host Network Eth0 4 Remote Management System Eth1 2 ACENet Amp (4ch.) ACU2 ACE-RIU CHAN A CHAN B CHAN C 2 Channel ACU CHAN D Advanced Simulation Technology, Inc. PTT PTT VCR or Other Recording Devices SINCGARS Hand-Held Terminal Powered Speaker Commercial and Military Headsets Figure 1: Theory of Operation Copyright © 2013 Advanced Simulation Technology inc.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Chapter 2: System Description 2.1. Target Hardware Components The Target consists of a number of hardware components and can be configured in many different ways depending on the requirements of the particular application. The components are discussed in more detail in the following sections. Engineering drawings supplied with each Target identify the overall system configuration.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 2.1.1. Chassis The standard Target is currently a 2U, 19” rackmount system. Target Depth Width Height Standard 2U With Front Rackmount 22 3/4” 24” 3 1/2” 3 1/2” With Middle Rackmount 22 3/4” 17” 19” (with thumb screws) 19” Weight 31 lbs. (as shipped) 3 1/2” Table 1: Telestra 4 Target Chassis Dimensions Figure 2: Telestra 4 Target Chassis A 1U Target option is also available.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 2.1.2. Power Supply The power supply is a standard 2U 400 watt or greater power supply. It is auto-sensing and accepts 100-240 Volts with 47 to 63Hz. The input power of the device is 100-240 VAC, 8A-4A, 47-67 Hz. 2.1.3. CPU Type The CPU type used in the system depends on the time of purchase and whether any CPU upgrades have been incorporated. The typical CPU is an Intel® multi-core processor. 2.1.4.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Status and monitor screens are provided in RMS enabling the user to monitor network activity and DIS radio traffic. DIS options and network parameters are set via RMS. ASTiNet: The ASTiNet is part of the Telestra 4 family network.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 2.2. Target Software Packages Overview 2.2.1. Operating System Software Software on the Target system includes an ASTi-configured Linux™ OS and ACE software for the sound and communications model runtime environment. Also included is ASTi's Remote Management System application software providing remote management, configuration and debug of ASTi systems over LAN/WAN from any standard computer with a proper web browser. 2.2.2.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Chapter 3: System Installation See the Telestra 4 Quick Start Guide (DOC-01-TEL4-QSG-1) for initial Target setup and IP address assignment. 3.1. Receiving and Unpacking Upon receipt of the Target, check that all packages are received according to the shipping manifest and that no apparent damage has occurred during shipping. Do not accept packages that are obviously damaged without first consulting with the carrying authority.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 3.3. Software Installation and Configuration Targets are shipped with all necessary software pre-installed. To rebuild the system’s hard disk, reference the Telestra 4 Target Cold Start Procedure (DOC-02-TEL4-TCS-1). Turn on the Target via the power switch on the front of the chassis. The system will boot into the Linux operating system.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 3.4. Default Network Settings After initial software installation or system cold start, the Target Ethernet interface eth0 tries to obtain a network IP address and subnet mask using DHCP. To obtain these network settings, a DHCP server must exist on the network intended for use by eth0. If the Target cannot contact a DHCP server using eth0, it will assign a meaningless IP address of 0.0.0.0 to that interface.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 3.5. Connections After unpacking the Target, connect the power, network, keyboard and monitor cords to the system as described below. Allow two inches of space to the rear of the Target for connections. Remove all plastic packaging from the Target before proceeding with the system installation. Note: As technology evolves, the Telestra 4 Target chassis will continue to change.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 3.5.5. Audio and I/O Equipment Connection External audio and I/O equipment such as headsets, microphones, amplifiers, preamplifiers, VCR audio in/out, tape players, PTT switches, etc. are connected directly to ACENet audio devices. 3.5.6. Cabling For minimum noise, individually shielded, twisted pair cable should be used for all audio lines.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Chapter 4: General Information This chapter provides general information about the Target. 4.1. Safety Precautions This section must be read completely and understood before using the Target. The following safety precautions must be observed when performing any operation and maintenance tasks associated with the Target. These safety precautions are necessary to prevent injury to personnel and damage to equipment.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 4.3. Customer Support Customer support is a major part of the ASTi audio simulation solution. If you have any questions about our product, how it can be used for your application, or suggestions for future enhancements, you can contact ASTi in the following ways: By Email - Send an email at any time to support@asti-usa.com. By Web - Contact us through the ASTi web site at www.asti-usa.com.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Chapter 5: HLA Runtime – Joining the Federation 5.1. HLA User Accounts All user account logins and passwords are case-sensitive. The default HLA user account (hlauser) is created for user convenience. WARNING: ASTi recommends changing the password for the account immediately after software installation or cold start.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 5.2. The HLA Remote Control Interface The HLA federate software runs in the background upon system startup and may only be accessed through the remote control interface. The user accesses the remote control interface through a TCP/IP connection to the appropriate control port.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 5.3. Testing the HLA Software 5.3.1. Host Emulation Utility The host emulation program (hostemu) that is shipped with the HLA software allows the user to test the remote interface and verify that it is working correctly. To run the host emulator on the local platform, log in as “hlauser.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 5.4. Remote Control Interface Commands and Responses The Target federate expects all command lines to be terminated with a newline character (“\n” for those who are C programmers). If two command lines come at once, they will be executed in order. A command will not be executed until the final newline (\n) is received. Commands are not case-sensitive.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Objects lists the number of transmitter and entity objects on the HLA network. For transmitters, the local counter reflects the number of local transmitter objects while the rti counter reflects the number of remote objects. For entities, the local counter reflects the number of entities the federate has detected on the HLA network. The attached counter reflects the number of local radios that are attached to existing entities.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) + 2 + 1). To log every possible message (not recommended), you would set the debug level to 2047 (1024 +512 + 256 + 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1). Debug messages are printed to the file /var/log/messages. HELP This command returns a list of all the supported remote control interface commands.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) RIDFILE /tmp/aced-repoKwg3FX/repo/domains/FEDERATE1/hla/standalone.rid CONVERT /tmp/aced-repoKwg3FX/repo/domains/FEDERATE1/hla/ convert3_2.conv These variables receive their initial values from the Project domain configuration on project/ layout install.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 5.5. RTI EXEC The HLA software that runs on the Target is an HLA federate. This federate software, when combined with the ACE Studio model processing, implements a full radio simulation environment, based upon the data structures defined in the ASTi Radio SOM. From power on, an HLA-enabled Target will start the federate application as a background process. A particular federate may be accessed through the remote control interface.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 5.5.1. Setting Up the Federation This section assumes that the RTI and federate software are properly installed on two Targets. This example will use the DMSO RTI (1.3NGv4) and, for the purposes of this scenario, the rtiexec process will run on one of the two Targets. Only one rtiexec process should exist on the network.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Chapter 6: Security 6.1. Security and Enhancements The Telestra 4 product suite is built around Red Hat® Enterprise Linux®, providing a communications solution that runs on a fully National Information Assurance Partnership (NIAP) validated operating system. NIAP is a U.S. Government initiative created to meet the security testing needs of both information technology (IT) consumers and producers.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) • Minimize Open Network Ports • All unnecessary network ports not vital for Target platform operation are closed. • BIOS Password Protection • BIOS protection includes security features that restrict access to the BIOS Setup program and restrict who can boot the Target. • Set a supervisor password and user password for the BIOS setup program and booting the Target.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 6.2. DISA & STIGS The Defense Information Systems Agency (DISA) develops and provides security configuration guidance for IA and IA-enabled IT products. The guidelines are outlined in DISA's Security Technical Implementation Guides (STIGS), which identify existing and potential vulnerabilities on a system. STIGS exist for a variety of operating systems and applications.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 6.3. Customer Responsibilities The vulnerabilities are given unique labels called Potential Discrepancy Items (PDIs). Each PDI is categorized with a short description of the vulnerability it represents. Out of the hundreds of PDIs, ASTi can eliminate the majority of them; however, the customer is responsible for eliminating several PDIs.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 6.4. Telestra 4 Security and Process Details Certain security features such as secure remote access, SELinux and user accounts are available on both ACE Studio and the Target platform by default. The additional security package is available for installation on the Target and Studio.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 6.5. Security Package Installation For the Target Security Package installation, reference the ACE Target Cold Start Procedure (DOC-02-TEL4-TCS-1) section 6.0 “Installing Telestra 4 Security Software Package” for stepby-step instructions. For the Studio Security Package installation, reference the ACE Studio Cold Start Procedure (DOC-02-TEL4-ASCS-1) section 5.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Chapter 7: Warranty and Repairs 7.1. Warranty Information The equipment is under warranty for a period of one (1) year following purchase. In the case of equipment upgrades, warranty applies to original date of shipment of individual components. Other commercial equipment purchased or provided such as monitors, amplifiers, speakers, fiber optic links, etc. are also covered under the one year warranty unless otherwise stated.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) 10. If equipment is not received by ASTi within thirty (30) days of the RMA number issuing date, the request data and number issued will be closed and designated as unused. 11. Any items received from customers without RMA numbers or appropriate contact information included with shipment will not be tested. After sixty (60) days, ASTi reserves the right to scrap all hardware received in this condition. 12.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Appendix A: System Specifications Temperature and Humidity Requirements Degrees Fahrenheit Degrees Celsius Humidity Altitude Operation Environment 50 – 90 F 10 – 32.2 C 20% – 95% Storage Environment 32 – 135 F -10 – 55 C 10% – 95% 0 – 8,000 ft. (2,438 meters) 0 – 8,000 ft.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Appendix B: Software Version Release Notes See Telestra 4 FAQs on the ASTi Web site (www.asti-usa.com/support/faq/telestra4.html). 34 Copyright © 2013 Advanced Simulation Technology inc.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Appendix C: HLA RTIs Compatibility ASTi is involved with an ever growing number of HLA-based communications simulations for a variety of programs throughout the US and internationally. Important: From experience, each HLA program has its own set of unique issues and problems dependent on the equipment, software and simulation deployed.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) Appendix D: Useful LinuxTM Commands The following commands are useful when navigating the Target via the command line. ls Typing ‘ls’ at the command line displays the files that are in a particular directory. It is similar to the ‘dir’ command in DOS. Common variations include ‘ls -l,’ which displays more information about the files and ‘ls -a,’ which will display all files and directories including “hidden directories.
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K) cp oldfile newfile The copy command allows users to create and rename copies of any file in the file system. You must always specify both the file being copied and the new file name.See below for some examples. mv oldfile newfile The Move command works exactly like the ‘cp’ command, except that the original file is moved instead of copied and will no longer exist in the original location. This can also be used to rename files.