Advertisement

Quick Links

500A Huntmar Park Drive
ASTi
Telestra Target
Operation and Maintenance Manual
Document: DOC-TEL-NA-OM-M-2
Advanced Simulation Technology inc.
500A Huntmar Park Drive, Herndon, Virginia, 20170 USA
Revision M, Version 2 (July, 2020)

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Telestra Target and is the answer not in the manual?

Questions and answers

Summary of Contents for ASTi Telestra Target

  • Page 1 500A Huntmar Park Drive ASTi Telestra Target Operation and Maintenance Manual Document: DOC-TEL-NA-OM-M-2 Advanced Simulation Technology inc. 500A Huntmar Park Drive, Herndon, Virginia, 20170 USA Revision M, Version 2 (July, 2020)
  • Page 3 Product Name: Telestra Target ASTi Telestra Target Operation and Maintenance Manual © Copyright ASTi 2020. ASTi documents are continuously updated and posted on our support website: http:/ / support.asti-usa.com/telestra/ Restricted Rights: Use, duplication, or disclosure by the Government is subject to restrictions as set forth in sub- paragraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
  • Page 5: Table Of Contents

    Table of Contents Chapter 1: Introduction ............1 1.1.
  • Page 6 Chapter 6: Security ............. 25 6.1.
  • Page 7: Chapter 1: Introduction

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) Chapter 1: Introduction The Target is an embedded, real-time platform, providing high-fidelity radio, communications and environmental cue modeling. The Target connects to ASTi’s flexible, networked-based ACENet architecture which provides a wide range of high-fidelity, scalable, digital 48 kHz audio and I/O peripherals.
  • Page 8: Theory Of Operation

    ACENet and process audio from the Target. The ACENet runs over ethernet, but is different from a typical LAN between computers. ACENet should be isolated from any other network, and each remote unit receives a name instead of an IP address. Reference the ASTi ACENet Guide for more information.
  • Page 9 ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) Remote Management System Eth0 Target Host computer Eth1 8-channel amplifier Clip/Mute Clip/Mute POWER STANDBY Bridge Bridge PROTECT Temp Temp Current Current DISABLE ACE-RIU ACU2 Advanced Simulation Technology inc. d Si...
  • Page 10: Chapter 2: System Description

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) Chapter 2: System Description 2.1. Target Hardware Components The Target consists of a number of hardware components and can be configured in many different ways depending on the requirements of the particular application. The components are discussed in more detail in the following sections.
  • Page 11: Chassis

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) 2.1.1. Chassis The standard Target is currently a 2U, 19” rackmount system. Weight Target Depth Width Height Standard 2U 22 3/4” 17” 3 1/2” With Front 24” 19” 3 1/2”...
  • Page 12: Power Supply

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) 2.1.2. Power Supply The power supply is a standard 2U 400 watt or greater power supply. It is auto-sensing and accepts 100-240 Volts with 47 to 63Hz. The input power of the device is 100-240 VAC, 8A-4A, 47-67 Hz.
  • Page 13: Acenet Devices

    4 ACENet User Guide (DOC-01-TEL4-AN-UG-1). 2.1.8. ACENet Devices The ACENet devices provide remote interfacing of audio and I/O peripherals to ASTi’s ACENet architecture. All audio and I/O is digitally distributed between the ACENet devices and Target modeling platforms for maximum noise rejection and reliability. The audio features 48kHz digital distribution and balanced pro-audio style interfaces, providing high-fidelity audio.
  • Page 14: Target Software Packages Overview

    Target. 2.2.3. Software Licensing The software included with the Target is ASTi proprietary and subject to the terms of the software license agreement. Copyright © 2020 Advanced Simulation Technology inc.
  • Page 15: Chapter 3: System Installation

    3.2. Parts Inventory After all equipment is removed from the packaging, verify equipment received against the shipping invoice. Notify ASTi immediately of any discrepancies. All Targets are shipped with engineering drawings that identify the system. Packing lists also provide detailed information about the shipment and may contain important notes.
  • Page 16: Software Installation And Configuration

    ASTi prior to shipment. The connections will vary over time and from system to system. Please read the ETH labels on your system to verify Ethernet locations.
  • Page 17: Default Network Settings

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) 3.4. Default Network Settings After initial software installation or system cold start, the Target Ethernet interface eth0 tries to obtain a network IP address and subnet mask using DHCP. To obtain these network settings, a DHCP server must exist on the network intended for use by eth0.
  • Page 18: Connections

    RJ-45 connection To network Remember to switch on the main power switch on the rear of the Telestra Target chassis. 3.5.1. Connecting ACENet Devices The ACENet devices connect to the Target through an Ethernet port connection on the rear panel of the chassis.
  • Page 19: Audio And I/O Equipment Connection

    3.5.7. Software Upgrade Users must perform a system cold start to upgrade the software. Please see the Telestra Target Cold Start Procedure (DOC-02-TEL4-TCS-1). Warning: Performing a system cold start to upgrade the software will cause complete erasure of the system hard drive.
  • Page 20: Chapter 4: General Information

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) Chapter 4: General Information This chapter provides general information about the Target. 4.1. Safety Precautions This section must be read completely and understood before using the Target. The following safety precautions must be observed when performing any operation and maintenance tasks associated with the Target.
  • Page 21: Customer Support

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) 4.3. Customer Support Customer support is a major part of the ASTi audio simulation solution. If you have any questions about our product, how it can be used for your application, or suggestions for future enhancements, you can contact ASTi in the following ways: By Email - Send an email at any time to support@asti-usa.com.
  • Page 22: Chapter 5: Hla Runtime - Joining The Federation

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) Chapter 5: HLA Runtime – Joining the Federation 5.1. HLA User Accounts All user account logins and passwords are case-sensitive. The default HLA user account (hlauser) is created for user convenience.
  • Page 23: The Hla Remote Control Interface

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) 5.2. The HLA Remote Control Interface The HLA federate software runs in the background upon system startup and may only be accessed through the remote control interface. The user accesses the remote control interface through a TCP/IP connection to the appropriate control port.
  • Page 24: Testing The Hla Software

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) 5.3. Testing the HLA Software 5.3.1. Host Emulation Utility The host emulation program (hostemu) that is shipped with the HLA software allows the user to test the remote interface and verify that it is working correctly. To run the host emulator on the local platform, log in as “hlauser.”...
  • Page 25: Remote Control Interface Commands And Responses

    The Audio counters increment as the federate sends or receives audio packets. The TDL counter increments as the federate sends or receives data messages. The ASTi SOM versions 3.1 and higher define a data message interaction to imple- ment tactical data link simulations in HLA.
  • Page 26 ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) Objects lists the number of transmitter and entity objects on the HLA network. For trans- mitters, the local counter reflects the number of local transmitter objects while the rti counter reflects the number of remote objects.
  • Page 27 • No license was available to run the RTI (MÄK or VTC RTIs) • The .fed file did not contain the names in the ASTi Radio SOM or was not found. If “JOIN <federation_name> OK” is returned, the system is running and can be interrogated to determine the federate status and activity.
  • Page 28 ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) RIDFILE /tmp/aced-repoKwg3FX/repo/domains/FEDERATE1/hla/stand- alone.rid CONVERT /tmp/aced-repoKwg3FX/repo/domains/FEDERATE1/hla/ convert3_2.conv These variables receive their initial values from the Project domain configuration on project/ layout install. After installation these parameters can be modified by passing parameters to the NAME command as shown below: NAME FEDERATION <NewFederationName>...
  • Page 29: Rti Exec

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) 5.5. RTI EXEC The HLA software that runs on the Target is an HLA federate. This federate software, when combined with the ACE Studio model processing, implements a full radio simulation environment, based upon the data structures defined in the ASTi Radio SOM.
  • Page 30: Setting Up The Federation

    4. The rtiexec should then indicate successful federate initialization. At this point, there is an “ASTi” federation with two joined federates. Note that the federate name for each Target was generated based on the hostname and IP address of the individual machine. To properly destroy the federation: •...
  • Page 31: Chapter 6: Security

    To the end user this means that the entire Telestra product suite including the Target and Studio, runs on an NIAP approved operating system. Couple this with ASTi's Telestra Security Package and you have an NIAP-approved OS that eliminates all CAT I and II issues while locking down the platform in a known working configuration and adhering to the most current security requirements.
  • Page 32 Note: The Telestra Security Package is an optional software package for the Target and Studio. • Security Hardening Scripts • Includes an additional software package for the Target and Studio with ASTi's customized security hardening scripts. • Eliminates the majority of CAT I, II, III, and IV issues (see DISA section below).
  • Page 33: Disa & Stigs

    • Category IV - Vulnerabilities that provide information that will lead to the possibility of degraded security. ASTi's goal for the Target and Studio is to eliminate all CAT I's and CAT II's and to minimize CAT III and IV vulnerabilities. ASTi has also incorporated the UNIX SRR scripts into the...
  • Page 34: Customer Responsibilities

    The vulnerabilities are given unique labels called Potential Discrepancy Items (PDIs). Each PDI is categorized with a short description of the vulnerability it represents. Out of the hundreds of PDIs, ASTi can eliminate the majority of them; however, the customer is responsible for eliminating several PDIs.
  • Page 35: Telestra Security And Process Details

    Future upgrades will be available as required based on customer demand. Additionally, ASTi will provide updates when a STIG update is available. Based on recent history, this means that if required we would release approximately four versions per year.
  • Page 36: Security Package Installation

    The PDF is generated from the non-ASTi generated DISA SRR results. ASTi transforms the raw results generated from the DISA SRRs into a user-friendly format. The first page shows a description of the Target platform under testing and includes information on the OS version, ACE Target software version, STIG/SRR version and Security Package version.
  • Page 37: Chapter 7: Warranty And Repairs

    Extended warranties are available - contact ASTi for details (703) 471-2104. 7.2. Repairs and Returns If it becomes necessary to return equipment to ASTi, please observe the following instructions: 1. Request an RMA number through the form on the ASTi web site: www://www.asti- usa.com/support/...
  • Page 38: Disclaimer And Warnings

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) 10. If equipment is not received by ASTi within thirty (30) days of the RMA number issuing date, the request data and number issued will be closed and designated as unused.
  • Page 39: Appendix A: System Specifications

    Reliability The ASTi sound system has been designed to use the minimal complexity of electronic hardware and the highest quality components. Special attention has been paid to the selection of traditionally less reliable elements such as the hard drive. To this end the Target contains a hard disk with a MTBF of 250,000 hours.
  • Page 40: Appendix B: Software Version Release Notes

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) Appendix B: Software Version Release Notes Go to Telestra FAQs on the ASTi web site (support.asti-usa.com/faq/index.html). Copyright © 2020 Advanced Simulation Technology inc.
  • Page 41: Appendix C: Hla Rtis Compatibility

    The user should choose the proper RTI based on the requirements (and GCC 3.4 compatibilities) of their operating system(s) or other HLA-related software. If there is an RTI that does not appear on this list but there is interest in it, contact ASTi to discuss the possibility of expanding the HLA software.
  • Page 42: Appendix D: Useful Linux

    ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) Appendix D: Useful Linux Commands The following commands are useful when navigating the Target via the command line. Typing ‘ls’ at the command line displays the files that are in a particular directory. It is similar to the ‘dir’...
  • Page 43 ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M) cp oldfile newfile The copy command allows users to create and rename copies of any file in the file system. You must always specify both the file being copied and the new file name.See below for some examples.

Table of Contents