11.07.2015 Views

Modeling Military Communication

Modeling Military Communication

Modeling Military Communication

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Session 1590<strong>Modeling</strong> Tactical <strong>Military</strong><strong>Communication</strong>s Using JCSSR&D Solutions for Commercial andDefense NetworksCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in anyCONFIDENTIAL ─ format RESTRICTED without the ACCESS: prior written This information consent of OPNET may not Technologies, be disclosed, copied, Inc. or transmitted in anyformat without © the 2007 prior OPNET written Technologies, consent of OPNET Inc. Technologies, Inc.© 2010 OPNET Technologies, Inc.


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSAgenda• Overview• Introduction to JCSS Model Library• <strong>Modeling</strong> Traffic• Tactical Radios• Satellite <strong>Communication</strong> Models• Tactical switches and Multiplexers• Legacy Voice and Voice over IP SystemsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.3


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSOverview—Why Use JCSS• Provides a rich suite of tactical communication models (not availablewith standard OPNET Modeler® installation) for use in Discrete EventSimulation (DES)• Discussed in Introduction to JCSS Model Library section• Can use military specific Information Exchange Requirement (IER)traffic and threaded traffic (chaining of IERs)• Discussed in <strong>Modeling</strong> Traffic section• Provides customized GUI/wizards/active attributes for easyconfiguration of tactical communication devices• Capacity planner• Logical viewsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.4


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSGUI/Wizards/Active Attributes• Generic Circuit Wizard—Configuration of circuits for circuitbaseddevices like Promina, FCCmultiplexers, TSSP-based earthterminals, Circuit to Packet devices• Link Deployment —Configurationof links between devices• SATCOM Wizards—Configurationof bent pipes, broadcast satellitelinks, Demand Assigned MultipleAccess (DAMA) satellite linksCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.5


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSGUI/Wizards/Active Attributes• Radio Links—configuration forline of sight radios (LOS) likeTRC-170• Broadcast Network—Configuration for tactical radioslike PRCs• Active Attributes—Utilities forpull-down menus, checkinginter-dependent attribute values,etc.• EPLRS• JIPM• Harris RF 7800wCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.6


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSCapacity Planner• Analytical tool to quickly calculate network utilizations, includingaverage link utilizations, circuit utilizations, etc., for a given set oftraffic• Can be used to check your network configurations, such as SATCOMlinks, circuits, and broadcast networks• Can be used to check traffic/circuit routability (based on genericshortest-path calculations)CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.7


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSCapacity Planner• Provides detailed reports about traffic, links, circuits• Routes• Utilizations• Supports most of the JCSS tactical communication models• Some exceptions: EPLRS, Harris 7800w, JIPM• CP support for each model needs a separate development from DESCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.8


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSLogical Views• Filtered view of the network by• Transmission systems (Layer 1)• Tactical radios• Technologies such as IP-layer devices, Promina devices, Link-16 devices, etc.• Same technology-based graphs used by CP for capacity calculationsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.9


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSAgenda• Overview• Introduction to JCSS Model Library• <strong>Modeling</strong> Traffic• Tactical Radios• Satellite <strong>Communication</strong> Models• Tactical switches and Multiplexers• Legacy Voice and Voice over IP SystemsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.10


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSJCSS Model Library• Discussed later in detail• Tactical radios—EPLRS, Harris RF 7800w, PRC, Link-16, Line of Sight TRC-170, etc.• Satellite communication models—TSSP-based SHF, Joint IP Modem (JIPM),UHF DAMA, etc.• Tactical switches and multiplexers – Promina, FCC-100, etc.• Legacy voice—Equipment such as DNVT, LEN, SEN, etc.• Voice over IP systems—Signaling protocols such as AS-SIP, H.323; gatewayssuch as SHOUTip, etc.• Encryptors• Layer 1: KG-84, KIV-7, etc.• Layer 3: KG-175, NES, etc.• Circuit to Packet—Transition gateways such as CTP, SCREAM, etc.CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.11


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSEncryptors•Models• Layer 1: KG-84, KIV-7, etc.• IP layer: KG-175, NES, TACLANE, etc.•Feature set• Layer 1• Bulk/Line encryptors—Encrypts and decrypts all traffic at each end ofcommunications line with out regard to traffic type• Work in pairs• Models overhead, delay, simple synchronization• IP layer• Encrypts and decrypts payload of IP datagram• Models overhead• Use case• Evaluating existing deploymentsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.12


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSCircuit to Packet• Models• Transition gateway like Juniper CTP• Transition gateway like N.E.T. SCREAM• Feature set• Juniper CTP• Converts serial data streams into IP packets• Transmits IP to destination CTP device• IP packets are converted back to the serialstream• N.E.T. SCREAM• Converts serial data streams to IP or ATMpackets using Circuit Emulation Service (CES)protocol• Can act as IP router as well as ATM switch• Use case• Transition studies from legacy circuit-baseddevices to IPCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.13


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSAgenda• Overview• Introduction to JCSS Model Library• <strong>Modeling</strong> Traffic• Tactical Radios• Satellite <strong>Communication</strong> Models• Tactical switches and Multiplexers• Legacy Voice and Voice over IP SystemsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.14


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSS<strong>Modeling</strong> Traffic• JCSS only• IERs (Information Exchange Requirement)• Standard OPNET products and also supported in JCSS• ACE and ACE Whiteboard (OPNET)• Standard and custom application models• Flows• Hybrid traffic—Adjustable ratio of explicit traffic to background traffic toprovide a trade-off between simulation fidelity and speedCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.15


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSIERs• JCSS-specific application type• Specification of how application-level messages should be fired• IERs define the traffic parameters such as the producer, consumer(s),duration/size, classification, start time, end time, distribution type, priority,and perishability of a given message• Provides traceability, statistics, reports, packet-level tracking• Can be defined in Scenario Builder• Can be imported from• Text files• IER report• DoDAF Editor• ACE/ACE Whiteboard to IERs• Each firing of an IER can be referred to as an IER instance• Threaded IERs• Process of linking/chaining IERs together to form an end-to-end mission thread• Consists of segments, where each segment is a unique IER firing• Each firing of a thread can be referred to as a thread instanceCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.16


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSTraffic <strong>Modeling</strong> Use CasesTraffic TypeIERsACEACE WhiteboardTypical Use Cases•Access to deployed traffic in IER form (text files, etc)•Quick and easy way to do reachability analysis for your network•Traceability•Reports•Application packet level tracking•Application is already deployed•Access to actual network traffic (packet traces)•Most accurate representation•Know the behavior of application to be deployed•Test before deploymentStandard Application Model•Study behavior of commonly used applications, such as email, http,FTP, etc.Flows• Load network with hybrid traffic to study your application model•Quick and easy way to do reachability analysis for your network•Capacity planning studiesCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.17


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSAgenda• Overview• Introduction to JCSS Model Library• <strong>Modeling</strong> Traffic• Tactical Radios• Satellite <strong>Communication</strong> Models• Tactical switches and Multiplexers• Legacy voice and Voice over IP SystemsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.18


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSTactical Radios•Models• EPLRS, Harris RF 7800w, PRC, Link-16, and TRC-170• Each radio models its unique feature set• Generic model of Frequency Hopping•Use case• Evaluating existing tactical radio deployments• Evaluating pre-deploymentsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.19


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSFrequency Hopping•Approach to reduce effects of narrow band interference bytransmitting the signal at different carrier frequencies• Most military radios use Frequency Hopping Spread Spectrum (FHSS)• JCSS implemented generic FHSS module to be used by many radiotechnologies• FHSS module specifies needed attributes• FHSS module performs all FHSS behavior• Minimal changes to MAC and pipeline stages• Seamlessly handle FHSS-aware and normal Tx and Rx devices• Provides Abstract and Detailed modeling modes• The module can be used to model FHSS in custom radio modelsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.20


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSRadios Instrumented with FHSS Module• EPLRS model• PRC model• SINCGARS• HAVEQUICK• Link-16 model• User-developed radio models can make use of the FHSS model byadding its generic function calls to the new process models andpipeline stagesCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.21


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSEnhanced Position Reporting LocationSystem (EPLRS)• Radio characteristics• TDMA, FDMA architecture• Supports FHSS• Ethernet Interface• <strong>Communication</strong> services (Needlines)• HDR Duplex Needlines – Static One-to-One <strong>Communication</strong>s• CSMA Needlines – Many-to-Many <strong>Communication</strong>s• Multi-Source Group (MSG) Needlines – Few-to-Many <strong>Communication</strong>s• Dynamically Allocated PVCs (DAP) Needlines – On Demand One-to-One<strong>Communication</strong>s• Needline features• Detailed <strong>Modeling</strong>• Detailed Time Slot, LTS (Logical Time Slot), and Frequency <strong>Modeling</strong>• Waveforms (Seventeen Modes Available)• Multi Hop Dynamic Routing (layer-2)• IP Routing, Multicast and Auto-Addressing support• Configuration – EPLRS Network Manager (ENM)• Unified configuration of Network and Radio settings for one division• Enhanced active attribute handlers validate/facilitate network configurationCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.22


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSEPLRS—Needlines• HDR Duplex• Acknowledgements and Retransmission (Reliable Delivery)• Dynamic path finding• Pipeline relay• MSG• Static/dynamic share allocation• Dynamic path finding• Pipeline relay• CSMA• CSMA channel access• Flooding• Blocking relay• DAP• HDR duplex• Resource allocationCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.23


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSEPLRS—Resources• Time resources• Exact Epoch/Frame/Slot structure• 1, ½, and ¼ LTS assignments• 2 ms and 4 ms modes• Frequency resources• 5, 6, and 8 Channel modes• Ability to disable/enable each channel• Waveforms• 17 waveforms• Each waveform provides a unique combination of bit rate and resiliency tonoise/interference• Supported networks• <strong>Communication</strong> network is modeled in detail• Coordination and Acquisition networks are not modeled• Their effect on time and frequency resources is modeled by resourcesallocated to the CSMA-DF needlinesCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.24


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSEPLRS—ExampleNetwork with 3 Divisions and 12 RS OPFACS Typical RS OPFACCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.25


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSEPLRS—Node Models•EPLRS_ENM• Represents ENM node for each division• One ENM per division• All division-wide configurations are through the attributes of the EPLRS_ENMnode• Frequency mode• Time slot mode• Needline definitions• …• <strong>Communication</strong> between ENM and Radios is not explicitly modeled•EPLRS_RS• Represents the RS radio node• Full IP stack• One radio interface and one Ethernet interface• Local radio properties such as RSID, Division ID, Power, and RelayEnable/Disable are configured through attributes of the RS nodeCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.26


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSEPLRS—ENMCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.27


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSEPLRS—RS• Essentially an IP router• Potential for more capabilities• One standard Ethernet interface• One EPLRS radio interface• Needlines modeled as subinterfaces ofthe radio interface (modeled by ENM)CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.28


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSEPLRS—PVC Needlines• Supported needline types• CSMA• MSG• HDR Duplex• Multicast groups• Defines set of radios that jointhe configured multicastgroupsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.29


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSEPLRS—DAP Needlines• Dynamic, On Demand HDR Duplex needlines betweenrequesting pairs of nodesCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.30


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSLab 1• EPLRS deployment• Please follow the lab manualCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.31


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSHarris RF 7800w• Broadband Ethernet radio is capable of achieving Ethernet rates (~80 Mbps)over wireless links• All-IP architecture allows for seamless connection of LAN and WANsegments (switches, routers, etc.)• Applicable for wireless backbone connectivity in Public Safety, FirstResponders, Battlefield networks, etc.• OU 440 radio operates in 4.5-5.0 GHz band and has one Ethernet interfaceand one RF interfacePTP ModePMP Mode – VLAN aware switchCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.32


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSHarris RF 7800w (cont.)• Supported Functionality• Interoperability with IPv4 and IPv6 devices• Point-to-Point (PTP)• PTP Master and Slave configuration• 802.1p (buffer management)• Adaptive TDD medium access• Reliable data transfer• Adaptive Modulation• Encryption• Point-to-Multipoint (PMP)• PMP SC and SS configuration• 802.1q (VLAN tagging with embedded 802.1p)• Adaptive TDMA medium access• Reliable Unicast data transfer• Multicast data transfer• Pass-through and VLAN aware switching• Encryption• Models• Harris_7800w_Config (configuration node)• Harris_7800w_OU440 (radio device)• Harris_7800w_AT001, Harris_7800w_AT002, Harris_7800w_AT003 (directional antenna models)• Harris_7800w_AT005 (sector antenna), Harris_7800w_AT006 (omni-directional antenna)CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.33


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSPRC Radios• Layer-2 broadcast radio, supports FHSS• Values set on channel• Frequency• Transmission power• Data rate• Fires voice IERs from its application layer (“se”module)• “mac” module• Manages the priority queues• Uses RE-NAD scheme for calculating NetworkAccess Delay (NAD) time for mixed voice and datatransmission• Prioritize voice traffic over data• Interoperates with Internet Controller (INC) or DataworkstationCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.34


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSLink-16• Tactical message exchange system• Devices supported• Host processor• Joint Range Extension (GRE) gateway• Joint Tactical Information Distribution System (JTIDS)• Multifunctional Information Distribution System (MIDS)CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.35


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSLink-16 Modeled Features• Network Participation Groups (NPGs)• Modeled within the JTIDS terminal as a combination of logically separatemessage queues that are associated with sets of transmit and receive time slots• Queue assignments for a message are based on message label, sub-label valuesand the J-series message standard• TDMA scheme• Detailed modeling of time slots• Slot group• Time Slot Block (TSB)• Time slot• Modulation / Encoding• Packing Levels for Standard, Packed-2 Single Pulse, Packed-2 Double Pulse,Packed-4 Single Pulse available• Access models (Dedicated, Contention, or TSR)CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.36


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSLOS Radios•Layer-1 radio—TRC-170•Antenna• Parabolic pattern• Directionally aimed at remote terminal•Values set on channel attributes• Data rate• Transmission powerCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.37


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSAgenda• Overview• Introduction to JCSS Model Library• <strong>Modeling</strong> Traffic• Tactical Radios• Satellite <strong>Communication</strong> Models• Tactical switches and Multiplexers• Legacy Voice and Voice over IP SystemsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.38


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSSatellite <strong>Communication</strong> Models• Models• SHF• Joint IP Modem (JIPM)• UHF (DAMA)• Use case• Evaluating the capabilities of current and planned satellite communications assetsagainst projected requirementsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.39


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSSuper High Frequency (SHF) SatelliteModels• Devices modeled• SHF satellite• SHF terminals• Generic• Non-nodal• NodalCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.40


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSSHF Satellite• Used with all Super High Frequency (SHF)terminals• Generic• Non-Nodal• Nodal• Features• 3 uplink transponders• Selectable antenna pattern• Selectable modulation• 25 channels• 5 downlink transponders• Selectable antenna pattern• Selectable modulation• 25 configurable channels• Configurable channel attributes• frequency, bandwidth, data rate, tx power• Uplink to downlink channel mapping• Bent pipe link running through a satellite hasfour legs (i.e., uses four frequencies)Satterm A to satellite uplinkSatellite downlink to Satterm ASatterm B to satellite uplinkSatellite downlink to Satterm BCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.41


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSGeneric SHF Terminals• Easiest satellite model to configure and use• Each port maps to a single channel• A single satellite link is needed for each two port connection between devices• No need for circuit creation• No resource management (such as TSSP)• One-to-one correspondence between an input and an uplink/downlink channel pair• Two models available• sat_term_generic_1port• sat_term_generic_8portInput 0Chnl 0F0Satellite LinksF0Chnl 0Input 0Input 1Chnl 1F1F1Chnl 1Input 1.........Input 7.Chnl 7F7F7.Chnl 7.Input 7CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.42


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSNon-Nodal SHF Terminal• Requires further configuration• A single link is needed between two terminals• Requires circuit creation between input ports ofeach terminal• Contains multiple input ports• One uplink MUX channel to carry outgoingaggregate traffic• One downlink deMUX channel to carryincoming aggregate traffic• Supports TSSP protocolCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.43


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSNodal SHF Terminal• Setup is similar to Non-Nodal SHF• A single link is needed between twoterminals• Requires circuit creation between inputports of each terminal• One uplink MUX channel to carryoutgoing traffic• Four downlink deMUX channels tocarry incoming traffic• Contains eight input ports• Supports TSSP protocol• Capable of supporting a full meshconfiguration of nodal terminals• Up to five interconnected nodalterminalsTSSP FrameA B C DData from respective inputsA BC DE FG HCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.44


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSJoint IP Modem (JIPM)• Satellite system with IP-based terminals• DoD specification for open-standards, interoperable, IP satellitemodem• Based on DVB-S2 and DVB/RCS open standards for satellitecommunications• Successful, widely used ETSI standard• One-way and 2-way communication• Efficient use of bandwidth• High data rates ( >100Mbps downlink)• Hub-Spoke architecture• Extra requirements mainly for Layer-3• Extra security requirements to fit DoD applications• Models Remote Modem (RM), Network Control Center (NCC) andsatelliteCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.45


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSJIPM Deployment Scenario and NodeModels• Node models• JIPM_RM• JIPM_Sat• JIPM_NCC• Features• MPE encapsulation• MPEG2 encapsulation• DL framing• UL framing• UL dynamic BW request• ACM and VCM• PEP• IP routing• Multiple JIPM networks• Multiple satellitesJIPM EntitiesCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.46


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSJIPM NCC—Network Definitions Attribute• DL and UL properties of individual networks supported by the NCCnodeCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.47


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSJIPM RM—Attributes• “Primary Network”• Name of the JIPMnetwork subscribed to ina two-way mode• “Secondary Network”• Name of the JIPMnetwork subscribed to ina receive-only mode• “Guaranteed Rate”• Guaranteed uplink rateCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.48


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSJIPM Satellite—Attributes• “Supported Networks”• Names of the JIPM networks supported to relayCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.49


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSLab 2• SHF and JIPM deployments• Please follow the lab manualCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.50


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSAgenda• Overview• Introduction to JCSS Model Library• <strong>Modeling</strong> Traffic• Tactical Radios• Satellite <strong>Communication</strong> Models• Tactical Switches and Multiplexers• Legacy Voice and Voice over IP SystemsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.51


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSTactical Switches and Multiplexers•Models•Smart multiplexers like Promina•Dumb multiplexer like FCC-100•Feature set•Support a layered configuration• One multiplexer connects to another as an input• Mirrored multiplexer on the other side•Use cases•Evaluating legacy circuit-based equipment deployments•Transition studies from legacy circuit-based devices to IPCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.52


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSPromina• Smart multiplexer• Capable of dynamic or static routing of circuits• Dynamic—Circuits will be routed on the first available shortest path• Static—Circuit will be routed on the pre-configured path• Capable of creating permanent or on-demand circuits• Permanent• Demand• Circuits can be preempted depending upon preempt priority• Multiplexing is based on time division multiplexing (TDM) scheme•Port groups• LAN (serial)—Interface to any serial bit stream device• LAN (ethernet)—Interface to ethernet device• WAN (serial)—Interface to promina network• WAN (ATM)—Interface to ATM backboneCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.53


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSPromina (cont.)•Circuit setup• Unidirectional or bidirectional• Configured by nw_circuit path object• Drag and drop from palette• Using circuit wizard• Performs switching of the incoming packets once the circuit is setup•Circuit setup criteria• Bandwidth availability• Maximum calls per node• Maximum hops per call• Maximum call setup retries• Maximum satellite hops• Example node models: Promina, Promina-100, IDNX-20CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.54


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSPromina (Attributes)CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.55


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSMultiplexers• Multiple inputs aggregated across a single interface to a peer• Port groups• Input (serial) - Interface to any serial bit stream device (e.g. Layer-1 encryptors,serial IP data, Promina aggregate, multiplexer aggregate)• Aggregate (serial) - Interface to multiplexer network• Requires circuits• Example node models: FCC_100v7, FCC_100v9CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.56


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSAgenda• Overview• Introduction to JCSS Model Library• <strong>Modeling</strong> Traffic• Tactical Radios• Satellite <strong>Communication</strong> Models• Tactical Switches and Multiplexers• Legacy Voice and Voice over IP SystemsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.57


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSLegacy Voice and Voice over IP Systems• Models• Legacy equipment: DNVT — end device• Legacy equipment: LEN, SEN, TTC-39—switches• VoIP protocols—AS-SIP (JCSS only), H.323 and SIP (OPNET models)• VoIP phone and translation gateways (between VoIP and legacy networks)• Use cases• Evaluating legacy equipment deployment• VoIP studies—transition from legacy equipment to IPCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.58


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSLegacy Voice—Circuit-Switched Devices• Call establishment and termination through sequence of messages• SETUP, QUERY, ACK, CONNECT• Link bandwidth reserved for each designated call for entire callduration• Use of Flood Search Routing (dynamic routing protocol)SETUPQUERYACKCONNECTCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.59


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSLegacy Voice—Circuit-Switched Devices(cont.)• <strong>Modeling</strong> call pre-emption based on call priority when bandwidth islimited• No traffic (packet) is going through the circuit during the call (ONLYanalytical update of statistics)• Call completion and teardowns are handled by global voice manager,node model:voice_config• Example node models: LEN, SEN, TTC-39CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.60


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSAssured Services—Session InitiationProtocol (AS-SIP)• Enhancements to OPNET SIP model• Resource priority in SIP signaling (higher priority call can pre-empt lowerpriority call) is supported• Open Loop Assured Services Admission Control (ASAC) is supported by UserAgent (UA) pre-emption• Closed loop ASAC is supported through network pre-emption• Signaling between Local Session Controllers (LSC) and MultifunctionSoftswitches (MFSS) is supported• OPNET Resource Reservation Protocol (RSVP) model enhancements• Network pre-emption is supported• New Output Table (OT) reporting for AS-SIP• New Discrete Event Simulation (DES) statistics for AS-SIP• AS-SIP signaling path can be visualized• New model user guide (MUG) for AS-SIPCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.61


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSN.E.T. SHOUTip• Gateway device between multiple types of networks and protocols• Conversions involve transferring voice signaling and data between legacyvoice networks (i.e., JCSS circuit-switched voice network) and the IPnetwork (i.e., Voice over IP)• Use either SIP, AS-SIP, H.323 for signaling in IP networkCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.62


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSObtaining JCSS• Obtain JCSS from the JCSS Configuration Manager at DISA• JCSS@disa.mil• Available to U.S. DoD personnel upon request at no cost• Submit a Justification Form to JCSS PMO• JCSS Configuration Manager issues the software• For more information, visit the JCSS PMO website at:• www.disa.mil/jcssCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.63


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSSupport Center• Information and assistance• Tech support cases• Software problem reports (SPRs)• Frequently asked questions (FAQs)• User forums• Contacts• Web—http://www.jcss.disa.mil• Email—jcss@opnet.com• Voicemail—(240) 497-3000 x6699CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.64


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSDocumentation References• Available in Help > Documentation menu• User manual—workflow• Technical reference manual—individual menu descriptions• Model user guides• IT Guru® Network Planner documentation• Software release bulletin• New features• Reported problemsCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.65


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSRelated OPNETWORK Sessions• 1589 Introduction to using the Joint <strong>Communication</strong> Simulation System (JCSS)• 1582 Planning Tactical Mobile Network Deployments• 1530 <strong>Modeling</strong> Custom Wireless Effects—Introduction• 1580 <strong>Modeling</strong> Custom Wireless Effects—AdvancedCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.66


1590 <strong>Modeling</strong> Tactical <strong>Military</strong> <strong>Communication</strong>s Using JCSSTake-Away Points• Model and analyze tactical military networks using JCSScommunication model library• Tactical radios• Satellite communication models• Tactical switches• Encryption devices• Much more• Model network traffic using IERs• Perform capacity planning analysis of military networksCONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. © 2010 OPNET Technologies, Inc.67

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!