Professional Documents
Culture Documents
Understanding Link 16
Understanding Link 16
Link-16
A Guidebook for New Users
September 2001
Limited Rights
Contract No.: N00244-02-C-0008
Contractor Name: Commanding Officer Navy Center for Tactical Systems Interoperability (NCTSI)
Contractor Address : 53690 Tomahawk Drive, Suite A125, San Diego, CA 92147-5082
The Government’s rights to use, modify, reproduce, release, perform, display, or disclose these technical
data are restricted by paragraph (b)(3) of the Rights in Technical Data—Noncommercial Items clause
contained in the above identified contract. Any reproduction of technical data or portions thereof marked
with this legend must also reproduce the markings. Any person, other than the Government, who has been
provided access to such data must promptly notify the above named Contractor.
Prepared by:
Limited Rights
Contract No.: N00244-02-C-0008
Contractor Name: Commanding Officer Navy Center for Tactical Systems Interoperability (NCTSI)
Contractor Address : 53690 Tomahawk Drive, Suite A125, San Diego, CA 92147-5082
The Government’s rights to use, modify, reproduce, release, perform, display, or disclose these technical
data are restricted by paragraph (b)(3) of the Rights in Technical Data—Noncommercial Items clause
contained in the above identified contract. Any reproduction of technical data or portions thereof marked
with this legend must also reproduce the markings. Any person, other than the Government, who has been
provided access to such data must promptly notify the above named Contractor.
■ Bold Type Important terms are printed in bold typeface the first time
they appear, and a definition is given.
■ Margin Notes Key points are summarized in the margin notes, which
are printed in blue. Wide margins are provided, and you are encouraged
to add your own notes as well.
■ Tables Facts are collected and summarized in tables to allow for quick
lookups and comparisons.
You can use this guidebook in either of two ways: for review or for reference.
You can review the most important concepts simply by reading the blue margin
notes and figure captions. To enhance its use as a reference, a list of acronyms,
a glossary, and an index may be found at the back of the guidebook.
Appendixes
Appendix A Multilink Operations
Appendix B Link-16 Platforms
Appendix C Acronyms and Abbreviations
Appendix D Glossary
Appendix E Index
Introduction to
Link-16
Introduction
Link-16 is the designation of a new tactical data link which is being introduced into
operations of the United States Navy, the Joint Services, and forces of the North Atlantic
Treaty Organization (NATO). It became operational in U.S. Navy ships and aircraft
during 1994. Link-16 does not significantly change the basic concepts of tactical data
link information exchange supported for many years by Link-11 and Link-4A. Rather,
Link-16 provides certain technical and operational improvements to existing tactical
data link capabilities.
This chapter summarizes the improvements to data link capabilities resulting from the
introduction of this new link to the Battle Group. You will learn what is provided by the
expanded message structure and what is provided by the improved waveform. And,
you will see how Link-16 compares with the existing links. A working knowledge of
current Link-11 and Link-4A operations is assumed.
1-1
Section A
Background
The general purpose of Link-16 is the same as that of
Link-11 and Link-4A: the exchange of real-time tactical
data among units of the force. While Link-16 is identical in
purpose to these links, it also provides some data exchange
elements which they lack, and it provides significant
improvements as well, such as nodelessness, jam resistance,
flexibility of communication operations, separate transmission
and data security, increased numbers of participants,
increased data capacity, network navigation features, and
secure voice.
Net 3
Net 2
Net 1
Net 0
JTIDS
Link-16
LK16/1-08M-004
(TADIL J)
Figure 1-1. Tactical data is shared among friendly units equipped with
Tactical Data Systems over Link-16 using the Class 2 JTIDS data terminal.
IJMS refers to The acronym IJMS refers to the Interim JTIDS Message
an interim Specification. Messages formatted according to this early, interim
specification specification were implemented in early TADIL J terminals
implemented in designated as the Class 1 terminals. These Class 1 terminals are
the early terminals. used primarily by U.S. Air Force and NATO E-3 aircraft. They
It is not fully support a limited JTIDS capability that is not fully compatible with
compatible Link-16.
with Link-16.
The U.S. Air Force Class 2 terminal implements the Class 1 IJMS
protocol as well as JTIDS. Because it can translate between
IJMS messages and J-series messages, it is said to be bilingual.
The U.S. Navy Class 2 terminal is not bilingual and cannot process
IJMS messages.
Features of Link-16 ■
Link-16 includes many features which improve on Link-11.
These include:
■ Jam resistance
■ Improved security
■ Increased data rate (throughput)
■ Increased amounts/granularity of information
exchange
■ Reduced data terminal size, allowing installation in
fighter and attack aircraft
■ Digitized, jam-resistant, secure voice capability
■ Relative navigation
■ Precise participant location and identification.
Link-11 + Link-4A
+ Secure Voice
+ Jam Resistance + Security equals Link-16
+ Throughput + Granularity + Capacity
LK16/1-08M-001
Section B
Comparison to Link-11
and Link-4A
Because Link-16 is functionally equivalent to an improved Link-11
with voice and Link-4A’s air control, comparing the architecture,
capacity, and data rates of these three links is worthwhile.
Architecture ■
■ Link-11
Link-11 uses a polling protocol and a netted architecture. A net is an
ordered conference whose participants have common information
needs or similar functions to perform. A net operates under the
supervision of a controller, who permits access and maintains circuit
discipline.
64
• •• 56 64 64 04 •• •
LK16/1-08M-080
NCS 04
27
56 10
■ Link-4A
■ Link-16
Net 3
Net 2
Net 1
Net 0
Figure 1-5. JTIDS units automatically transmit and receive data at preassigned times on
preassigned nets based on instructions given to their terminals when they are initialized. These
preassignments are determined in advance of operations to support the expected information
exchange requirements of the force.
Data Exchange ■
The Link-11 data is divided into 24-bit frames, with two frames constituting
a Link-11 message. The messages used to exchange information over Link-11 are
known as the M-series messages. At the fast data rate, 24 bits of data are transmitted
every 13.33 milliseconds (msec). This is 75 frames, or 1800 bits, per second.
The more commonly quoted rate of 2250 bits per second includes 6 bits with each
frame for error detection and correction (EDAC).
Link-16 TDMA Assigned Time Slots J-Series Standard 26.88 28.8 59.520
Packed-2 53.76 57.6 119.040
Packed-4 107.52 115.2 238.080
LK16/1-08M-002
Figure 1-6. Link-16 supports the functions of both Link-11 and Link-4A, as well as additional
functions such as voice, relative navigation, and an expanded electronic warfare capability.
Packed-2, and 1800 bits at Packed-4. The same time slot with Reed-Solomon
encoding holds 210 bits of tactical information at Standard packing, 420 bits of
tactical information at Packed-2, and 840 bits of tactical information at Packed-4.
To calculate the average data rate, multiply the number of tactical information bits
per slot by the number of slots per second.
Because of the increased data rate of JTIDS, far more data can be transmitted on
Link-16 than on Link-11 during the same period of time. Recognizing this,
the developers of the Link-16 J-series message standard have added J-series data
elements that cannot currently be exchanged over Link-11. The Link-16 J-series
messages allow the reporting of two to three times as much tactical information as
Link-11. However, the amount of Link-16 data operationally required and
implemented by USN platforms is estimated to be only about 50 percent more than
currently implemented Link-11 data.
The nearly 54 kilobits per second (kbps) tactical data rate for the Packed-2 structure
is actually the instantaneous rate, determined by assuming 420 data bits (6 70-bit
words) are transmitted in 1/128 second. The capacity of the JTIDS network can be
increased further by using multinetting techniques. Statistical analysis has shown
Architecture
■ TDMA
■ Nodeless
■ Message and Transmission Encryption
■ Frequency Hopping
■ UHF, L x Band
■ Line of Sight
Message Types
■ Fixed Format (J-Series)
■ Free Text (voice)
■ Variable Format
Operational Use
■ Surveillance
■ Electronic Warfare
■ Mission Management
■ Weapons Coordination
■ Air Control
■ Fighter-to-Fighter
■ Secure Voice
■ Navigation
■ Positive Identification
Section C
Features of the JTIDS
Architecture
Several features of Link-16 resulting in improved communi-
cation are derived from the unique JTIDS architecture.
Nodelessness ■
An established
JTIDS network A node is a unit required to maintain communications. In
operates Link-11, for example, the NCS is a node. If the NCS goes
independently down, the link goes down. In Link-16 there are no nodes.
of any particular Time slots are preassigned to each participant, and the link
unit. will function regardless of the participation of any particular
unit. The closest thing in Link-16 to a node is the Net Time
Reference (NTR). An NTR is needed to start up a network
and for a new unit to synchronize with and enter a network.
After a network has been established, however, it will
continue to operate for hours without an NTR.
Security ■
Both the message and the transmission are encrypted. The
message is encrypted by the KGV-8 encryption device in
accordance with a cryptovariable specified for message
security, or MSEC. Transmission security, or TSEC, is
provided by another cryptovariable that controls the specifics
of the JTIDS waveform. One important feature of this
waveform is its use of frequency hopping. The hopping
pattern is determined by both the net number and the TSEC
cryptovariable. This instantaneous relocation of the carrier
frequency spreads the signal across the spectrum, making it
both difficult to detect and difficult to jam. The TSEC
cryptovariable also determines the amount of jitter in the
signal, and a predetermined, pseudorandom pattern of noise
that is mixed with the signal prior to transmission.
■ Air Control
■ Fighter-to-Fighter
■ Secure Voice
Stacked Nets ■
The same set of time slots may be used for more than one net Time slots may be
simply by assigning a different frequency-hopping pattern to "stacked" into
each. The hopping pattern is determined by the TSEC multiple nets by
cryptovariable and the net number. Nets which have the same assigning a
TSEC and same MSEC cryptovariables, but different net different
numbers, are referred to as stacked nets. frequency-hopping
pattern to each.
For each time slot, a JU is either transmitting or receiving on
one net. In order to use the stacked net structure, the partici-
pants on each net must be mutually exclusive. Stacked nets
are particularly useful for air control purposes with mutually
exclusive sets of controlling units and controlled aircraft.
They are also used for voice communications, providing a
potential for 127 different voice circuits for each of the two
voice NPGs.
AA
AA
AAAA
AA
AA
AAAA
AA
AAAA AA
A
AAAA
NET 3
AA
AAAA
AAAA
Stacked Net
Air Control
AAAA
AAA
NET 3
NET 2
AAA
AAAA
AAA
A
NET 1
NET 0
A AA
AAA
AA AA
AAAAA
AA
NET 1
LK16/1-08M-082
AA
AAAA
Figure 1-9. Stacked nets are useful for air control purposes, with
mutually exclusive sets of controlling units and controlled aircraft.
Section D
Summary of New
Capabilities
The Link-16 J-series messages allow the reporting of two to
three times as much exchangeable tactical information as
the Link-11 M-series messages. Some of the field sizes have
been increased to allow an improved degree of precision in
the reporting of data. Some new functions are defined.
Areas in which major improvements or changes have been
made include:
■ Addresses
■ Track Numbers
■ Track Quality
■ Track Identification
■ Friendly Status
■ Increased Granularity of Measurement
■ Lines and Areas
■ Geodetic Positioning
■ Relative Navigation
■ Electronic Warfare
■ Land Points and Tracks.
Addresses ■
Each participant, or JTIDS Unit, is assigned a unique
address. In Link-16, the JU addresses are five-digit octal
numbers in the range 00001 to 77777, whereas the Link-11
PU Address field accommodates only the three-digit octal
addresses up to 177. However, to accommodate multilink
communication, C2 JUs must always be assigned addresses
below 00177. The Link-16 addresses 00001 to 00177 are
equivalent to the Link-11 addresses 001 to 177. An address
in this range can be assigned only to one unit, whether it is
a PU or a C2 JU. NonC2 JUs — for example, fighters — use
only the addresses 00200 through 77776. The address 77777
uniquely identifies the TADIL J Manager.
Track Numbers ■
Link-16 employs a five-character alphanumeric Track
Number (TN) within the range 00001-77777 or within the
range 0A000-ZZ777, allowing up to 524,284 TNs. Link-11
uses a four-digit TN in the range 0001 to 7777, allowing
only 4,092 TNs on Link-11. Link-16 cannot be operated in a
TN pool mode, as can Link-11, in which a common pool of
track numbers can be shared by several PUs. The TDMA
architecture does not permit proper TN accountability in a
pool. Therefore a much larger number of Link-16 TNs is
necessary in order to permanently or semi-permanently
allocate adequate blocks of TNs to each of the many units
which will eventually be equipped for Link-16.
Track Quality ■
Link-16 uses Track Quality (TQ) values that range from 0
through 15. Each TQ value is defined by a specific positional
accuracy range. The highest Link-16 TQ value requires better
than 50-foot accuracy. By comparison, the highest Link-11
TQ value is 7. A Link-11 air track can have a TQ of 7 with
a positional accuracy worse than 3 nautical miles (nm).
Track Identification ■
The Track Identification (ID) reporting capabilities of
Link-16 have been greatly expanded. Tracks are reported on
Link-16 with a detailed ID that includes Platform, Activity,
Specific Type, and Nationality. In addition, a provision has
been made for an identity of “Neutral,” and Unknown
Assumed Enemy has been changed to “Suspect.” In Link-11,
track identification is limited to three fields: Identification,
Primary Amplification, and ID Amplification.
Friendly Status ■
The Link-16 messages allow much more detailed reporting
of the status of friendly aircraft, including the following
which are not reported on Link-11: equipment status, exact
ordnance inventory, radar and missile channels, fuel available
for transfer, gun capability, and ETA and ETD to/from
station. On Link-16 a unit can also report its inventory of
specific surface missiles such as SM-2(ER), Tomahawk
TLAM C, and others.
Increased Granularity of
Measurement ■
Granularity is a measure of how precisely a data item can
be reported in the data link messages. The major Link-16
granularity improvements are in track positions, air track
speeds, altitudes, and lines of bearing.
AA
AA
AA
AA
AA A
AA
AA
AA A
AA A LK16/1-08M-083
Figure 1-10. Link-16 allows corridors and areas of all shapes and
sizes to be reported.
Geodetic Positioning ■
The Link-16 messages implement a three-dimensional
geodetic coordinate system using latitude, longitude, and
altitude. This allows positions to be reported anywhere in the
world, subject only to display and data base limitations. By
contrast, Link-11 uses the Cartesian coordinate system, and
allows track reporting only within a limited range of the
reporting unit.
Latitude: 20° N
Longitude: 7° E
LK16/1-08M-084
Figure 1-11. With three-dimensional geodetic positioning, a location anywhere in the world
can be reported.
Relative Navigation ■
Relative Navigation (RELNAV), an automatic function of
the JTIDS terminal, is used to determine the distance
between platforms by measuring the arrival times of
transmissions and correlating them with reported positions.
This information is required for the terminals in a network to
remain synchronized. Automatic RELNAV is in constant
operation in all JTIDS terminals, providing information that
allows terminals in the network to remain synchronized. This
RELNAV data can be used to improve a unit’s positional
accuracy. And, if two or more units have accurate, indepen-
dent knowledge of their geodetic positions, RELNAV can
provide all units of the network with accurate geodetic
positions. As a result, the precise geodetic position of every
unit can be maintained constantly by every other unit.
Electronic Warfare ■
Link-16 allows greater exchange of Electronic Warfare
(EW) parametric information and a wider range of EW
control. EW units exchange parametric data and orders on
their own NPG and EW product information on the
Surveillance NPG.
70°
50°
Waypoint (50° N 27° E)
30°
Waypoint (30° N 24° 15' E)
LK16/1-08M-085
10°
22° 23° 24° 25° 26° 27° 28° 29° 30° 31°
Figure 1-12. The Link-16 messages add land as a track category. Land points describe
physical objects. Reference points describe theoretical constructs.
EW Limited Detailed
LK16/1-08M-003
Section E
Planned Implementation
Many more platforms will be equipped for Link-16 than were
equipped for Link-11 and Link-4A. It is anticipated that the
number of MIDS/JTIDS-equipped U.S. platforms will
approach 5000 by the year 2015.
U.S. Navy ■
U.S. Navy ships which will have JTIDS and Link-16 include
aircraft carriers (CVs and CVNs), cruisers (CGs and CGNs),
destroyers (DDGs), amphibious assault ships (LHDs and
LHAs), and submarines (SSNs). Implementation of Link-16
aboard U.S. Navy ships is planned in two phases, which are
designated Model 4 and Model 5. These differ greatly in the
capabilities they provide. Current configuration information,
and much more, is available at the Navy website —
http://link16.spawar.navy.mil.
U.S. Army ■
The U.S. Army employs the JTIDS Class-2M (modified)
terminal. This terminal, weighing less than 88 lbs, is
manufactured by GEC-Marconi. It is designed specifically for
Army ground-based operations, with a user rate below 8 Kbps
and a connectivity requirement of 85 percent in a non-
jamming environment and 70 percent in a jamming
environment.
2
C
H
A
P
T
E
R
The Shipboard
Link-16 Equipment
Introduction
2-1
Section A
Overview
Link-16 improves on existing tactical data link communications in
two ways—through more complete and more accurate tactical
information and through superior communications technology. The
major components of the Navy shipboard Link-16 system include:
The TDS and C2P provide the tactical data to be exchanged. The
JTIDS terminal and antennas provide the secure, antijam,
increased-capacity waveform. There are two configurations of
Link-16, known as Model 4 and Model 5.
Receive Transmit /
Antenna Receive
Antenna
LK16/2/08M-016
Model-4 Link-16 ■
The Model-4 implementation of Link-16, also referred to as
Block 0 on ACDS platforms, was designed as a “transparent”
equipment upgrade to existing ships’ tactical systems.
Currently, both the AEGIS and the ACDS TDS software are
programmed to comply with operations specifications
OS-411 and OS-404. For both AEGIS and ACDS platforms,
the Model-4 Link-16 upgrade consists of the addition of new
hardware: the Command and Control Processor, and the
JTIDS terminal and antennas. The tactical systems, including
the Combat Direction Systems (CDS), Shipboard Gridlock
System (SGS), Command and Decision (C&D), and Weapons
Control Systems (WCS), are virtually unchanged.
Model 4 provides For the transmit function, the Model-4 C2P receives the
the JTIDS M-series messages normally output for Link-11 from the
waveform for the CDS and the V-series messages normally output for Link-4A
existing Link-11 from the WCS. It reformats the data contained in these
and Link-4A messages in accordance with Link-16’s J-series message
data-exchange standard and passes them to the JTIDS terminal for
capabilities. transmission over the link.
Link-4A
Model 4 SGS
C&D
Joint Tactical Information
Link-16 Messages
Distribution System
MIL-STD-1553B Bus (JTIDS) Terminal
LK16/2-08M-017b
Navigation
Link-4A
Link-11
SGS
Joint Tactical Information
Link-16 Messages
Distribution System
MIL-STD-1553B Bus (JTIDS) Terminal
LK16/2-08M-017d
Navigation
Model-5 Link-16 ■
Model 5 is the full The Model 5 implementation of Link-16, also referred to as
implementation of Block 1 on ACDS platforms, is the full and complete
Link-16: JTIDS implementation of Link-16 in accordance with OS-516.1. It
waveform and provides many improvements in data link communications as
expanded described in Chapter 1. Its implementation requires major
data-exchange modifications to the TDS computer program and data base.
capabilities. The displays and the operator interface to support the new
Link-16 capabilities are implemented in a new console, the
OJ–663. The installation of the Model-5 system is both an
equipment upgrade and a computer program upgrade.
Link-4A
Model 5
WCS Link-4A Messages Link-4 UHF
DTS Radio
Link-11
(JTIDS) Terminal
SGS Navigation
Link-4A
Link-11
AA
(Block 1) N-Series Messages
Navigation
Figure 2-5. The ACDS Model-5 tactical system incorporates the SGS
function. Like the AEGIS Model 5, it exchanges normalized data with the
C2P. The C2P translates between this normalized data and the
appropriate message series required by each link.
Section B
The Tactical Data System
The shipboard Link-16 TDS consists of one or more AN/UYK-43
computers. The Model-5 operator interface is implemented on the
OJ-663 console, which supports color graphics and overlaid
windows-based displays.
8
01
M-
/08
16/2
LK
Link-11
Link-11 Messages
Tactical Normalized Data Crypto
Link-11 HF/UHF
A A
DTS Radio
Data N-Series Messages
C2P
System
Link-16
data base
Figure 2-7. The exchange of data among TDS computers allows all
JTIDS units to share the same integrated tactical picture.
Section C
The Command and Control
Processor
The AN/UYQ-62(V) Command and Control Processor
subsystem, or C2P, is a message distribution system that
provides the interfaces between the TDS computer and the
JTIDS terminal, the Link-11 DTS and the Link-4A DTS.
It consists of an AN/UYK-43 computer, which runs the C2P
computer program, controlled by an AN/USQ-69 data
terminal set (DTS). The AN/USQ-69 DTS serves as the
Man-Machine Interface (MMI), also known as the
Human-Computer Interface (HCI), to the C2P hardware and
software. Two versions of the C2P software are implemented:
Version 0 for Model 4, and Version 1 for Model 5.
C2P Functions ■
The C2P is at the heart of the Link-16 system and performs a
multitude of critical functions. It receives outgoing information
from the TDS computer, translates it, and formats it for
subsequent transmission on Link-16, on Link-11, or on Link-4A.
Conversely, the C2P receives incoming information from these
tactical data links, translates it, and provides it to the TDS
computer. The C2P also automates many link-protocol, message-
formatting, and message-receipt/compliance functions. Finally, it
performs data forwarding whereby information received on one
data link is translated and retransmitted on another data link.
Link-4A
Link-11
Link-11 Messages
Tactical Normalized Data Crypto
Link-11 HF/UHF
DTS Radio
A
A AA
Data N-Series Messages
C2P
System
AA
Joint Tactical Information
Link-16
Link-16 Messages
Distribution System
MIL-STD-1553B Bus
(JTIDS) Terminal
Figure 2-8. The C2P is at the heart of the shipboard tactical data link
systems. As a message translation and distribution system, it provides the
interfaces between the TDS computer and the JTIDS terminal, the
Link-11 DTS, and the Link-4A DTS. The C2P is housed in a separate
AN/UYK-43 computer.
To control the data links, the operator may select any of over
30 displays from the HCI’s “Table of Contents” screen.
Operator entries, such as Participating Unit or JTIDS Unit
(PU/JU), Data Link Reference Point (DLRP), track block
assignments for both Link-16 and Link-11, and operational
mode, must be entered at the HCI before a link can be
initiated. Improperly entering any of these values may cause
the link to degrade or to break down completely.
Section D
The JTIDS Class-2 Terminal
The AN/URC-107(V)7 shipboard JTIDS terminal is an
advanced radio system that provides for the rapid exchange
of tactical information among a large number of users. It
employs secure, jam-resistant, digital data and voice
communications at a combined rate of 28.8, 57.6, or 115.2
kbps to provide a communications link with a low probability
of intercept (LPI). JTIDS operates in the 960-MHz to
1215-MHz frequency band and employs the Time Division
Multiple Access (TDMA) architecture described in Chapter 4.
JTIDS, which provides line-of-sight (LOS) communications,
is designed for interoperability with other Services and the
Allies.
Terminal Functions ■
To better understand all the functions of the JTIDS terminal,
let’s compare it with a Link-11 system. A shipboard Link-11
system includes a KG-40 for encryption, a Link-11 DTS for
analog-to-digital conversions, and a radio for transmission
and reception.
Link-4A
Link-11
Link-11 Messages
Tactical Normalized Data Crypto
Link-11 HF/UHF
A
A A
DTS Radio
Data N-Series Messages
C2P
A
System
Link-16
■ Relative Navigation
■ Synchronization
■ Secure Voice
The JTIDS terminal supports two simultaneous secure voice The JTIDS
channels, often referred to as J1 and J2, for JTIDS voice terminal provides
channel 1 and voice channel 2, respectively. Each shipboard for two
terminal contains two 16-kbps voice digitizers, or vocoders, independent
that translate voice audio to a stream of bits and divide them secure voice
into the designated time slots. On reception, the bits are channels, each
recombined and translated back into the audio signal. capable of
operating on 127
Multiple JTIDS voice circuits can be operated simultaneously, different circuits.
since each circuit of each channel is defined by a different net
number (0-127). In other words, if voice users A, B, C, and D
are all on separate platforms, voice users A and B can talk on
J1 on net 50 while voice users C and D are also talking on J1,
but on net 25. A and B will not interfere with C and D.
Although digital voice data is not error-coded — all transmitted
bits correspond to actual data bits — it is encrypted.
■ Relay
Any JTIDS unit The JTIDS terminal employs radio relay techniques to
can be initialized extend communications beyond line of sight (LOS). The
to function as a relay function is performed by retransmitting messages
relay. received during one time slot in another designated time slot
at a later time. The delay between the original transmission
and the relay retransmission varies between 6 and 31 time
slots. Any JTIDS terminal can function as a relay, but relays
must be designed into a JTIDS network in advance because a
JTIDS terminal must be assigned pairs of time slots in its
initialization load. After a terminal has been initialized as a
relay, it will automatically perform the function unless
directed otherwise. Note that the use of relays doubles the
number of time slots required to exchange data. More
detailed information concerning relays can be found in
Chapter 6.
■ Built-in Test
Shipboard Terminal
Components ■
The AN/URC-107(V)7 Navy shipboard JTIDS terminal is
74 inches high, 24 inches wide, and 44 inches deep. It
weighs approximately 1600 pounds and consists of several
components, including:
AAAAAAAAAAAAAAAAAAAAAAAA
Antenna A Antenna B
Link-16 Link-16
AAAAAAAAAAAAAAAAAAAAAAAA
Receive Transmit /
Receive
AAAAAAAAAAAAAAAAAAAAAAAA
RF Limiter
AAAAAAAAAAAAAAAAAAAAAAAA
Antenna Notch
Interface Filter
AAAAAAAAAAAAAAAAAAAAAAAA
Unit Assembly
AAAAAAAAAAAAAAAAAAAAAAAA
To MIL-STD-1553B Bus
C2P
AAAAAAAAAAAAAAAAAAAAAAAA
External High-
Timer Digital Data Receiver/
Power
AAAAAAAAAAAAAAAAAAAAAAAA
Processor Transmitter Amplifier
Voice
Users
AAAAAAAAAAAAAAAAAAAAAAAA
Blanker
AAAAAAAAAAAAAAAAAAAAAAAA
Interface
Mute Unit
AAAAAAAAAAAAAAAAAAAAAAAA
Secure
AAAAAAAAAAAAAAAAAAAAAAAA
Data Unit
AAAAAAAAAAAAAAAAAAAAAAAA
Indicator
Control Panel
AAAAAAAAAAAAAAAAAAAAAAAA
Keyer
Control
AAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAA
JTIDS Terminal
Digital Data Processor Group Receiver/Transmitter High-Power Amplifier Group
LK16/2-08M-073
Figure 2-10. The JTIDS terminal consists of the Digital Data Processor Group, the Receiver/
Transmitter, and the High-Power Amplifier Group. Two control panels are provided. The
Secure Data Unit is a separate assembly that mounts directly on the terminal.
Receiver/Transmitter
Drawer
Indicator Control Panel
WRA Status Panel
High-Power Amplifier
Group Drawer
0
02
M-
-08
1 6/2
LK
Figure 2-11. The components of the shipboard JTIDS terminal are housed
in a single cabinet containing, from top to bottom, the Receiver/Transmitter,
High-Power Amplifier Group, Digital Data Processor Group, Secure Data
Unit, and Power Interface Units. Batteries are included.
Processors within The processors within the JTIDS terminal are connected by
the JTIDS the Plain Text Bus to each other and to shared Global
terminal Memory residing in the DDP. All transactions on this bus
communicate either are reads and writes to Global Memory or are port-to-
through shared port transfers. Port-to-port transfers are used, for example,
Global Memory. when communicating with the host external timer. Thus, the
SICP executing within the IU, and the NICP executing
within the DDP, communicate with each other through the
use of shared Global Memory located in the DDP.
J-Series
Messages
AIU
Audio Voice
Port 1
HPA
Voice PTP
Audio
Port 2
IU DDP
JTIDS Class-2
Terminal
Figure 2-12. The Digital Data Processor Group contains several processors which communicate
through shared Global Memory.
The Secure Data Unit (SDU) is a removable assembly The SDU holds
mounted on the IU. It stores the cryptovariables loaded cryptovariables
during initialization and provides both message security which provide
(MSEC) and transmission security (TSEC). An Electronic both message
Transfer Device (ETD) is used to load the cryptovariables. security and
transmission
The cryptovariables (CVs), which are binary keys security.
represented by strings of ones and zeroes, are normally used
in pairs called today/tomorrow pairs. Each pair consists of
one CV for today’s operation and another CV for tomorrow’s
operation. This pairing of cryptovariables allows all
participating terminals to automatically shift to the
designated CV at “crypto rollover,” thereby providing
continuous JTIDS operations across the rollover period. The
SDU is provided as Communications Security (COMSEC)
material.
■ Receiver/Transmitter
Bandpass Filter
Circulator
IFF IFF
TACAN / DME
Channels
every 1 MHz
51 Frequencies
969 1008 1053 1065 1113 1206
JTIDS
Frequencies
every 3 MHz LK16/2-08M-021
■ Battery Assembly
Keyer
Control
Panel
0a
02
M-
08
/2-
16
LK
TIME SURFACE
OVERLOAD OVERRIDE CONTROL CPU/ALARM COL DRIVE
ICP FAIL
SCL PGI RST
U CE PANEL
DEF BM
DISPLAY
RST RST
PAGE STEP
1 2 3
A B C D E F G H I J 4 5 6
K L M N O P Q R S T 7 8 9
U V W X Y Z SP + – / • 0 ENT
LK16/2-08M-025
The Keyer Control Panel (KCP) is located on the face of the DDPG
drawer and is used during shipboard terminal initialization to
control the transfer of cryptovariables from the Electronic Transfer
Device (ETD) into memory in the Secure Data Unit (SDU).
VAR SELECT
4 5 SECURE ALARM
3 6
2 7
1 8
LAMP TEST
ZERO TEST
LK16/2-08M-024
Figure 2-16. Cryptovariables are loaded into the Secure Data Unit
through the Keyer Control Panel.
Terminal Initialization ■
The C2P initializes the shipboard JTIDS terminal from a tape
containing a library of predesigned networks. This tape is called
the JTIDS Network Library, or JNL. During initialization, the
operator specifies a network number, design option, and option
sequence number which enables the C2P to extract the required
time slot assignments from the JNL tape. Other parameters such as
the JU number and track block assignments are also entered.
Information required for initialization is disseminated to the Battle
Group in a military message called the Operational Tasking Data
Links or OPTASK LINK.
Section E
Link 16 Antennas
An antenna performs two functions: radiating electromagnetic
energy from a transmitting device to the atmosphere, and
converting the atmospheric electromagnetic radiation to RF
electric current for the receiver.
The JTIDS The earlier version of the JTIDS shipboard antenna system
employs the AS-4127/URC-107(V) Transmit/Receive (T/R)
terminal receives
antenna and the AS-177B Receive-Only (RO) antenna. The
information from
AS-4127 antenna is 28 inches high, 47 inches in diameter, and
both antennas
weighs 133 pounds. It is physically mounted at the top of the
and selects mast supporting the TACAN antenna. The AS-177B antenna,
the messages from which is 20 inches high, 6.5 inches in diameter, and weighs
the antenna with 7 pounds, is mounted in a different location on each ship.
the more favorable The JTIDS terminal receives information from both antennas
signal-to-noise and selects the message from the antenna with the more
ratio. favorable signal-to-noise ratio.
TACAN
Antenna
JTIDS
Antenna 1
AS-4127
Antenna 2
AS-177B
Feed-through Tube
MAST
Figure 2-17. The JTIDS antenna system employs two antennas. The larger, main antenna
interfaces to the NFA and transmits as well as receives. The smaller antenna interfaces
directly to the R/T and performs only the receive function. The earlier version of the JTIDS
antenna system employs the AS-4127 and the AS-177B antennas.
The new Link-16 antenna system consists of the AS-4127A T/R antenna and the
AS-4400 RO antenna. These units are issued as a set for shipboard installation, and
AEGIS ships were the first to receive them. The AS-4127A is a two-half,
wrap-around antenna that is 19.5 inches high, 41 inches in diameter, and weighs
100 pounds. It can be mounted in one of three configurations: on a vertical
cylindrical mast, on a canted rectangular mast, or with a mast extension unit that
supports the TACAN antenna. This last configuration is the highest on the mast and
provides the best LOS communication. The AS-4400 antenna, which is 17.7 inches
high, 6.0 inches wide at the base, and weighs 5 pounds, offers several improvements
over the AS-177B. It has a higher gain and an excellent voltage standing-wave ratio
(VSWR) throughout the JTIDS band. And, the AS-4400 can be used as a transmit
antenna if a failure occurs in the main T/R antenna — with some degradation in
pattern, however, due to blockage.
Both antennas are broadband, vertically polarized UHF antennas that provide
omnidirectional coverage over the 960-to-1215-MHz JTIDS frequency band. Both
have a “peak-of-beam” at the horizon, which maximizes LOS, and both can operate
at 1.2 kW peak power and 140W average power. They are mounted so that the
antenna elevations have a 1:3 ratio. This height diversity between the AS-4127A and
the AS-4400 helps resolve multipath problems.
The AS-4400 antennas have also been installed for JTIDS applications at some
land-based facilities. At certain sites, two of the AS-4400 antennas have been
installed, with one configured to perform the T/R function and the other configured
for the RO function.
JTIDS
Antenna 1
AS-4127A
H/3
JTIDS
Antenna 2
AS-4400
Baseline
Figure 2-18. The newer configurations employ the AS-4127A T/R antenna with the AS-4400
RO antenna, mounted with a height diversity ratio of 1:3. Together these provide improved
performance, and the AS-4400 can be used as a transmit antenna if the main T/R antenna
fails.
Section F
The Link-16 Data Flow
The successful exchange of Link-16 tactical information
requires that the data pathway extend completely from the
transmitting TDS computer to the receiving TDS computer.
The flow of digital data during transmission is illustrated in
Figure 2-19.
Tactical
Data JTIDS Terminal
C2P
System
(70 bits) (70 bits) Transmit on
10110101 10110101
SICP NICP assigned time
slot of assigned
. . . . 01 . . . . 01 ■ Net ■ Encrypt net of assigned
■ NPG ■ Parity NPG
Modulation
LK16/2-08M-071
Figure 2-19. The 70-bit data words for transmission are encrypted, encoded, interleaved, and
converted to transmission symbol pulses for transmission during an assigned time slot on an
assigned net of an assigned Network Participation Group (NPG).
Demodulation
LK16/2-08M-072
Figure 2-20. Frequency-hopped pulses are demodulated from the carrier and passed to the
JTIDS terminal for deinterleaving, decoding and decrypting of the 70-bit message data
words. Reed-Solomon error correction and parity checking ensures that the original message
is received uncorrupted by bit errors.
Figure 2-21. Ships scheduled to receive Link-16 include crusiers, destroyers, amphibious
assault ships, and all aircraft carriers.
3
C
H
A
P
T
E
R
The E-2C Hawkeye and the F-14D Tomcat are the only two Navy airborne platforms on
which JTIDS are currently being installed. Nearer the end of this century, the Navy’s
F/A-18 Hornets will become equipped with a different Link-16-compatible terminal, the
Multifunctional Information Distribution System (MIDS). This chapter concentrates on
the E-2C and the F-14D and the airborne variants of the JTIDS terminal.
3-1
Section A
Overview of Navy Link-16
Airborne Platforms
The Link-16 systems aboard aircraft differ somewhat from
their shipboard counterparts. Constraints on space and the
load envelope aboard aircraft, for example, dictate that the
components of airborne JTIDS terminals be located
separately, rather than within a single large, heavy cabinet.
Further, the human-computer interface must sometimes
accommodate existing controls and displays. The systems on
both types of platform however, perform the same function:
transmitting and receiving Link-16’s J-series messages. All
airborne platforms implement Model-5 Link-16.
The Navy The Navy airborne Link-16 platforms are of two general
airborne types. One, the E-2C Hawkeye, is a carrier-based Airborne
Link-16 Early Warning (AEW) system, equipped as an airborne
platforms command and control (C2) platform. The other, the F-14D
are the Tomcat, is an interceptor (“fighter”) aircraft, equipped for
E-2C and carrying out airborne intercept missions under the direction
the F-14D. of a C2 platform and capable of communicating with
similarly equipped fighters using J-series messages in the
Link-16 Fighter-to-Fighter Network Participation
Group (NPG).
E-2C
Manufacturer Grumman
Wing Span (ft) 81 (29 folded)
Length (ft) 58
Height (ft) 18
Service U.S. Navy
Mission Early Warning, Tactical Command & Control
Based Carrier, Shore
Crew Size 5
F-14 Tomcat
Both the E-2C and the F-14D will retain the ability to
communicate on other tactical data links. The E-2C Hawkeye,
The airborne for example, retains its current Link-11 and Link-4A
platforms will capabilities and will now be able to conduct simultaneous
retain their Link-4A and Link-16 air control while performing Link-16
ability to support surveillance. A special broadcast mode in the E-2C, used
other links. when all other units have been placed in emission control
(EMCON), will allow this aircraft to transmit all tracks
simultaneously on Link-11 and Link-16. Because the E-2C
is not equipped with a C2P, however, it cannot function as a
data forwarder between the two links.
Operational Considerations ■
JTIDS operates in the UHF frequency spectrum, which limits Maximum
communications to line of sight (LOS). With aircraft at 30,000 practical LOS
feet, however, LOS communications can occur at distances range for
greater than 300 nautical miles (nm). Setting up an aircraft as a air-to-air
relay can extend LOS communications to nearly 600 nm. With communications
ship-to-ship LOS communications limited to about 25 nm, it is is about
easy to see the importance of a Link-16 aircraft. 300 nm.
The ratio between the effective earth radius and the true earth
radius, denoted by the symbol K, can vary between 1/2 and 5.
The average value of K in temperate climates, however, is
approximately 4/3. Using this value for the effective-radius
factor, and assuming that the altitude of a transmitter is much
smaller than the radius of the earth, a good approximation of the
distance to the radio horizon (in miles) is √2h where h is the
altitude measured in feet. The nomogram in Figure 3-3 gives the
maximum radio path length between a transmitting antenna at
one altitude and a receiving antenna at another. The distance to
the radio horizon can be found by using a value of zero for one
of the antennas.
Radio coverage
D at altitude h
h
"TRUE" EARTH
"RADIO" EARTH
D= 2h LK-16/3-08M-91 R1
h = altitude in feet
D = distance in miles
K = 4/3; not to scale
Figure 3-2. The range of LOS communications is limited by the curvature of the earth. UHF
radio transmissions actually extend beyond the geometric horizon because of refraction, or
bending, of the signal by the atmosphere. This increase in range can be approximated by an
enlarged earth. Using an effective-earth-radius factor suitable for temperate climates, the
distance D in miles to the radio horizon for a transmitter at height h in feet can be
approximated by D = √2h.
Figure 3-3. The maximum radio path length in miles between antennas at
different heights is given in this nomogram. In this example, the height of the
receiving antenna is 200 feet and the height of the transmitting antenna is
15,000 feet, giving a maximum radio-path length of 190 miles. To obtain the
distance to the radio horizon, use a height of 0 feet for one of the antennas.
Section B
The E-2C Hawkeye
The E-2 Hawkeye, manufactured by Grumman, was one of
the first airborne early warning, tactical command and
control aircraft. Sixty-two of these aircraft were initially
delivered as E-2As to carrier-based squadrons during the
1960s. In the early 1970s, the E-2As were modified to meet
the E-2B standard, which differed mainly in having an
improved computer. Deliveries of the E-2Cs also began in
the early 1970s. The E-2C is the current configuration, and
over eighty of these models are in operation.
Mission ■
The E-2C's primary mission is to augment and extend the
Battle Group's air picture. At an altitude of 30,000 feet, the
E-2Cs extend the radar detection range of the E-2 exceeds 300 miles. The
Battle Group's air E-2C can maintain a 3-million-cubic-mile surveillance
picture. envelope while simultaneously monitoring maritime traffic.
It can track over 600 targets and control over 40 airborne
intercepts. A squadron of E-2Cs is usually assigned to a
carrier. Currently, sixteen squadrons are deployed.
Figure 3-4. The E-2C Hawkeye is a Link-16 airborne platform deployed for
surveillance and air intercept control. With its enhanced radar range, it
provides surface combatants with early warning information.
Description ■
Equipment Configuration ■
The E-2C’s Link-16 system consists of the L-304 mission
computer, the JTIDS terminal and specially adapted controls,
and four JTIDS antennas. As part of the mission computer
upgrade, the JTIDS terminal was installed along with the
Global Positioning System (GPS), an Enhanced High-Speed
Processor (EHSP), an improved APS-145 radar, and new
displays. The L-304 mission computer program has been
upgraded as well, to implement the protocols for Link-16
data exchange. The equipment configuration of the E-2C is
illustrated in Figure 3-5. Refer to Figure 3-6 for their
locations aboard the aircraft.
Link-16 Receive
TACAN Link-16
Transmit / Receive Transmit
Antenna
Interface
Unit
MIL-STD-1553B BUS
Mission
Computer External Digital High
Timer Receiver/
Data Power
Transmitter
Processor Amplifier
Voice
Blanker
Mute Interface
Unit
SAHRS
Course
Indicators
IFF
BDHIs
TACAN
Control Secure
JTIDS Data Unit
Control Panel
Load Control
Unit
Battery LK-16/3-08M-095
Figure 3-5. The E-2C JTIDS system consists of the JTIDS Class-2 terminal, which interfaces
with the mission computer and several other host systems to provide Link-16, TACAN, and
navigation functions. In addition, the E-2C JTIDS system includes a High Power Amplifier
Group and the JTIDS antennas.
1 2 3 8
6 7 9
A A
4
10
5
LK-16/3-08M-094
11 11
Figure 3-6. The E-2C’s Link-16 configuration consists of an upgrade to its mission computer,
an improved radar system, JTIDS terminal components, and new displays. The E-2C’s JTIDS
components are located in its forward section, and the controls and displays are located in the
aft section. The wing-mounted antennas are not shown.
1
4
LK-16/3-08M-097
1 JTIDS Audio Select Panel
2 MFCDU
3 TACAN Control Panel
(Above Windshield)
4 JTIDS Audio Select Panel
5 MFCDU Control
Figure 3-7. The JTIDS controls in the E-2C's cockpit include two audio
select panels, the MFCDU, and the TACAN control panel.
A
AAAAAA
AAAAAAA
AA
AA
1 MFCDU Control Panel
AAAAA
4 MFCDU
AAAAA
3
EMDU
1 2 4
ADU
LK-16/3-08M-098
Figure 3-8. The E-2C's CIC also contains JTIDS controls and displays. Here, the location
of the ACO station in the CIC is shown. The ACO station contains a Multifunction Control
and Display Unit (MFCDU), an Enhanced Main Display Unit (EMCU), and a JTIDS
functional control panel.
The JTIDS audio select panels, in the cockpit and at the Air
Control Officer (ACO) station in the CIC, indicate voice
channel activity and allow the selection of TRANSMIT,
TRANSMIT/RECEIVE, or RECEIVE ONLY on each of the
two JTIDS secure voice channels. The EMDU, located at
each of the aft CIC stations, is integrated with the E-2C’s
weapons control functions, including communications
functions associated with Link-16, Link-11, and Link-4A.
The single main JTIDS functional control panel, located at
the ACO station in the aft CIC section, performs the ON/
STANDBY/OFF function necessary when resetting the
terminal. It also contains a separate switch to zeroize the
encryption device, another switch for enabling long-term
transmit inhibit (LTTI) during EMCON operations, and
audio volume controls for the two JTIDS voice channels.
■ JTIDS Antennas
Terminal Initialization ■
The E-2C The E-2C's JTIDS terminal is loaded from a Raymond
JTIDS terminal cassette created by the Tactical Aircraft Mission Planning
is loaded from System (TAMPS). Three initialization files can be stored on
a Raymond each cassette. Processing a JNL tape to create terminal
cassette. initialization files is just one of the functions performed by
TAMPS. Information required for building initialization
files is provided in the OPTASK LINK message.
Section C
The F-14D Tomcat
The Navy’s F-14 Tomcat fighter aircraft, built by Grumman,
has been deployed aboard aircraft carriers since the early
1970s. Over 500 F-14As were delivered until production of
this version ceased in the late 1980s. In addition, 80 F-14As
were sold to the Iranian Air Force between 1976 and 1978.
The F-14D, built since the mid-1980s, is the current version,
containing upgrades to its radar, weapons management, and
navigation systems.
Mission ■
The multimission-capable F-14D Tomcat is designed for air The F-14D can be
superiority and fleet air defense. Its primary mission is controlled over
performing air intercepts. It can be controlled either over either Link-16 or
Link-16 or Link-4A. Link-4A.
Description ■
The Tomcat is a supersonic, twin-seat, twin-engine fighter aircraft.
It can vary its wing geometry from forward to swept-back position.
Its wings are programmed to move forward or backward
automatically for optimal flight, although the aircrew may override
this programming. The twin vertical fins of its tail is readily
observed in forward profile. Although it typically cruises at speeds
between 400 and 550 knots, at high altitude the Tomcat is capable
of exceeding twice the speed of sound.
The aircrew consists of two persons: the pilot occupies the front
seat, and the Radar Intercept Officer (RIO) occupies the rear seat.
Equipment Configuration ■
To provide Link-16 communications, the F-14 Tomcat employs the
AYK-14 mission computer in conjunction with the JTIDS terminal.
In addition, it retains its capability to perform Link-4A and can
now conduct air control operations on either Link-4A or Link-16.
The F-14D will also be able to exchange target information and
report engagement status with other F-14Ds through the fighter-to-
fighter NPG. The F-14D’s equipment configuration is illustrated in
Figure 3-10. Refer to Figure 3-11 for their locations aboard
the aircraft. Antenna A Antenna B
Link-16/TACAN Link-16/TACAN
Transmit/Receive Transmit/Receive
MIL-STD-1553B BUS
Mission
Computer External Digital
Timer Receiver/
Data
Transmitter
Processor
Voice
Blanker
Mute Interface
Unit
SAHRS
Course
Indicators
IFF
BDHIs
TACAN
Control Secure
JTIDS Data Unit
Control Panel
Load Control
Unit
Battery
LK16/3-08M-096
Figure 3-10. The JTIDS terminal interfaces with the mission computer
and several other host systems to provide Link-16, TACAN, and
navigation functions for the F-14D.
7 8 9
LK-16/3-08M-099
6 5 4 3 2 1
Figure 3-11. The F-14D’s Link-16 configuration consists of the AYK-14 mission computer,
the JTIDS terminal, and the JTIDS antennas. With the Model-5 upgrade in place, JTIDS’
TACAN function will replace the F-14D’s AN/ARN-118 TACAN system.
■ Mission Computer
1 1
LK-16/3-08M-100
1 MDRI
2 Radio Frequency/Channel
Indicator
3 Audio Controls
6
4
9
3
7
8
2
LK-16/3-08M-101
Figure 3-13. Most of the F-14D’s JTIDS controls and displays are available to the
RIO. These include a digital display, a tactical information display, an RF channel
indicator, a JTIDS control panel, an antenna selection panel, one MDRI, a data
entry unit (DEU), and a data link control panel.
■ JTIDS Antennas
Terminal Initialization ■
The F-14D JTIDS The F-14D's JTIDS terminal is loaded from a Data Storage
terminal is loaded Unit (DSU). The DSU contains nonvolatile memory and can
from a DSU. hold one initialization load file. Like the terminal load file
for the E-2C, this file is created by TAMPS from the JNL
tape and parameters supplied in the OPTASK LINK mes-
sage.
4
C
H
A
P
T
E
R
Messages and
Interfaces
Introduction
Several processors are involved in the successful exchange of information between
Link-16 tactical systems. This chapter explains the flow of data between these processors,
and summarizes the standards that govern its transfer. It’s okay to skip this chapter if
you’re not interested in the nitty-gritty details of how the tactical data gets from the
tactical system computers to the processor that actually transmits it on the network ... as
long as you realize that it takes several steps and requires several intermediary
computers.
4-1
Section A
Overview
Between tactical systems, the exchange of information
over Link-16 is defined by the J-series message formats.
The interface between the TDS and the C2P, which is unique
to the shipboard configuration, is defined by the N-series
message formats. The interface between the host, either a
C2P or an airborne mission computer, and the JTIDS
terminal over the 1553B MUX bus to the JTIDS terminal is
defined by Terminal Input Messages (TIMs) and
Terminal Output Messages (TOMs). This data is received
by the Subscriber Interface Control Program (SICP)
executing within the Interface Unit (IU) component of
the terminal.
J-series
messages
Audio Voice
Port 1
N-series
messages Voice
Audio PTP
Port 2
1553B A Bus
1553B B Bus
MDTC Interrupt
C2P DTBs
(Shipboard SICP NICP R/T
Only)
DT Interrupt
Global
Memory
LK16/4-08M-005
UYK-43
TIMs DDP
IU
Figure 4-1. The exchange of information between the components of the JTIDS system is
strictly defined for each interface.
Section B
The N-Series Messages
The Model-4 C2P relies on input from the tactical systems
in the form of messages from Link-11 and messages from
Link-4A. The Model-4 C2P reformats the data in these
messages to create the Link-16 J-series messages. The
Model-4 capabilities and data resolution (accuracy)
are limited to the same capabilities and resolution supported
by existing Link-11 and Link-4A message formats.
er
ont
itt
Ai r Co n
ke C
Em
tro ce
l rfa
EW
Stri
Su
En
ga
ge Ref
ck
Tra
m
Air
en rence
EW F ge
g / Ra n
tS
re q tat ear in
u us B
e
ti c
en
y
us
c
Ac o
Po
t in
N-series
LK16/4-08M-006
messages
Section C
The J-Series Messages
Like other tactical data links, Link-16 conveys its informa-
tion in specially formatted messages. These message for-
mats are composed of sets of fields, each of which is com-
posed, in turn, of prescribed numbers of bits that may be
encoded into predetermined patterns to convey specific
information. The messages exchanged over Link-16 between
participating TADIL J units are the J-series messages.
Figure 4-3. Using the J-series message formats, the U.S. Services exchange digital
information between tactical systems over Link-16 .
r
itte
Ai r Co n
eC
Em
tro ce
l rfa
Strik
EW
k
Su Refe
rac
En
r
ga
dT
en
ge Ref
tus
Lan
ck
ce
Tra
C2P ta
me eren
Fli ent S
Air ng e
ol
gem
Poin
EW F a
nt
ring / R gh
ntr
re q ta tP
Cor ga
ea
S
tus r
Co
e
u cB ath
En
t
Air
ti
EW
l at
en
Tra
y
s
Convert N-series
u
ion
ce
c
Ac o
ck
Po
in
to J-series
t
Link-16 M-series
Figure 4-4. The C2P is a critical component of the shipboard Link-16 system. Not only does
it create the J-series messages from normalized data, it forwards data between Link-11 and
Link-16.
Section D
Terminal Input Messages
Terminal Input Messages (TIMs) are sent from the host TIMs transfer
computer to the terminal’s Interface Unit (IU) over the data from the
MIL-STD-1553B multiplex (MUX) data bus. On airborne host (C2P or
platforms, the mission computer is the host. On shipboard mission
platforms, the C2P is the host. The host, acting as bus computer) to the
controller, issues command words to control the transfer of terminal.
data.
Thirty TIMs have been defined for transferring data from the
host to the SICP that executes in the IU. Besides data words,
which are issued by a tactical or mission computer, TIMs also
contain command words and status words. The command
words are issued by the bus controller, and the status words
are issued by the IU in response to command words.
The host can send TIMs to the IU at any time. The host
restricts its transfer of TIMs, however, so that no given TIM
type is updated more frequently than every 20 milliseconds.
Additionally, the host restricts its transfer of common
carrier messages, which are sent in TIMs 2 through 11, to
the rate of 10 per 50 milliseconds.
AAAAAAA
AAAAAAA
JTIDS Class-2 Terminal
AAAAAAA
AAAAAAA
1553B A Bus
1553B B Bus
AAAAAAA
MDTC Interrupt
AAAAAAA
HOST SICP
TIMs AAAAAAA
AAAAAAA
IU
AAAAAAA LK16/4-08M-008a
■ Initialization Data
■ Common Carrier Messages (J-series)
■ Target Sorting (J-series)
■ Air Platform and System Status (J-series)
■ Host Navigation Data
■ Requests for Data
■ External Time Reference
■ Clock Synchronization
TIMs 2 through 11 are the common carrier messages. Each TIMs 2 through
message generates a block of data that consists of 10 words 11 convey most
of header followed by 5 to 120 words of message body. of the J-series
The message body, containing the appropriate initial, message data
extension, and continuation words defined for the J-series to the SICP.
messages, spans as many of the ten 32-word TIMs as
necessary. By setting a Loopback ID number in the header, the
host may request that the terminal periodically report on the
status of a given message. This message status information
might indicate whether or not the message has been transmitted,
what state the receipt/compliance processing is in, and so on.
t
Hos
m:
Fro (C2P) ries
J-se
Attn: SICP
TIM
LK16/4-08M-009a
The host can TIM 16 can be used to request information from the SICP,
request including the current contents of any memory location. It is
information from also used to set time of day, to provide the host’s response to
the SICP, provide a message that requires operator acknowledgement, to
operator request advanced notification of specific time slots, and to
acknowledgements, specify a particular net number and network participation
and specify net group.
numbers and
NPGs.
TIM 17 transfers navigation data and geodetic position fixes
from the navigation systems of the host platform to the
SICP. Dead-reckoning data is provided at least once every
250 milliseconds. Geodetic fixes are provided as available.
Section E
Terminal Output Messages
TOMs transfer Terminal Output Messages (TOMs) are used to transfer data
data from the from the terminal SICP to the host computer over the
terminal to the MIL-STD-1553B bus. Thirty TOMs have been defined.
host.
In addition to the J-series messages received from the JTIDS
network, TOMs contain terminal status information,
performance statistics, and confirmation of control setting
changes made by the operator. Data destined for an optional
tape recorder used during testing is transferred to the host in
TOMs 21 through 27. Also available are the transmission
and receipt/compliance status of up to 10 messages identified
by the host with a loopback number.
AAAAAAAA
AAAAAAAA
JTIDS Class-2 Terminal
AAAAAAAA
MDTC Interrupt
HOST SICP
AAAAAAAA
AAAAAAAA
AAAAAAAA
IU
TOMs
AAAAAAAA
LK16/4-08M-008b
■ Status
■ Received Messages (J-series)
■ TACAN Data
■ Terminal Navigation Data
■ Loopback Data
■ Tape Recording Data
■ Host-Requested Data
TOMs 2 through TOMs 2 through 20, along with TOM 1, are used to
20 convey transfer messages received from the network to the host.
network J-series Message filtering is performed by the terminal in accordance
messages to the with instructions supplied by TIM 1 at initialization.
host. Messages which satisfy the filter requirements will be
assembled into blocks that consist of five words of header
followed by five to 120 words of message data. The message
body, containing the appropriate initial, extension, and
continuation words defined for the J-series messages, spans
as many of the 32-word TOMs as necessary. The SICP will
duplicate the header as necessary to order the data in the
sequence: header/message, header/message, header/message,
and so on.
S
JTIDl
ries
m: a
Fro ermin
T
J-se
To: Host
(C2P or
Mission Computer)
TOM
LK16/4-08M-009b
Section F
The Multiplex Cycle
The exchange of TIMs and TOMs takes place cyclically
during what is called the MUX (multiplex) cycle. TIMs may The MUX cycle
be sent to the SICP in the IU at any time during this cycle. prevents the C2P
But access to the TOM buffers is controlled to avoid and the JTIDS
collisions by the host and SICP. Which system has access is terminal from
governed by an interrupt, called the MUX Data Transfer writing to the
Complete Interrupt (MDTCI). For the 10 msec immedi- same place at the
ately following this interrupt, the SICP has authorization to same time.
update the TOM buffers. The TOM 1 buffer is updated every
time. All other TOM buffers are updated only when required.
Following this 10-msec interval, the host may read the data
for as long as necessary. When the host has finished reading
the buffers, it signals its completion by writing a TIM 29.
This causes another MDTCI interrupt to be generated, and
the next MUX cycle begins. The length of each cycle varies,
but must be at least 20 milliseconds.
(MDTCI) (MDTCI)
Host
SICP updates Host reads
writes
TOM buffer buffers
TIM 29 Elapsed
Time
0 msec 10 msec (Variable,
20 msec)
LK16/4-08M-011
Figure 4-9. Host-generated interrupts define the timing of the MUX cycle and control the
exchange of data and status information between the host and SICP.
Section G
Data Transfer Blocks
J-series J-series messages contained in the TIMs passed from the
messages are host to the SICP must next be passed to the NICP program
transferred back executing in the Digital Data Processor (DDP). Global
and forth Memory within the DDP is used for this purpose and is
between the IU accessed by the SICP and the NICP using the Plain Text Bus
and the DDP in (PTB). Information is exchanged between these two
DTBs. programs in Data Transfer Blocks (DTBs).
DTBs sent from the SICP to the NICP may contain messages
for transmission, initialization data, status information or
navigational data. Those sent in the other direction, from the
NICP to the SICP, may contain received messages,
looped-back messages, navigational data, network
configuration information, or message status. In addition,
every 12 seconds the NICP generates a complete status
report, which includes the quality measurements as well as
tabulations of successful and unsuccessful transmissions,
receptions, loopbacks, and test messages.
DTBs
SICP DTBs
NICP
Global
IU Memory DDP
P
s
ge
C
via st
SI
sa ion
Ho
a
at
s
n
ice
s
ta
e is
lD
io
Da
:
sM m
at
Vo
om
na
rm
ie ans
n
io
ed
tio
Fr
r
fo
at
tiz
se Tr
iza
In
vig
J- for
gi
al
us
Na
Di
iti
at
In
St
m ce
s
tu
ts
re n
en
ta
su ma
sS
ea or
ge
M erf
sa
P
es
M
NI ork
n
via etw
s
io
ed
e
ice
at
ed g
itt
iv ssa
ur
N
k C ta
Vo
es sm
fig
Da
e e
:
sa ran
ed
c
om
on
Re es M
l
tiz
na
es T
Fr
gi
SICP to NICP
M k
io
ri
or
c
Di
at
a
e
tw
-b
-s
vig
d
Ne
ed
ive
J
Na
op
ce
Lo
Re
10
-0
08M
4-
Ship to: SICP 16
/
LK
NICP to SICP
Figure 4-10. Data Transfer Blocks (DTBs) written to global memory are
used to exchange information between the SICP and the NICP. The J-series
messages are only a portion of the information that is exchanged.
DTBs are passed from the NICP to the SICP using two sets of
pointers and buffers. The SICP and the NICP each have a set
of five pointers and five buffers. If the buffer is empty, the
pointer to that buffer is set to 0. If there is data, the pointer is
set to the beginning of the buffer. The NICP reads and writes
The NICP and its data immediately following the End-of-Slot interrupt, which
SICP take turns occurs at the end of each time slot: every 7.8125 milliseconds.
exchanging data After the NICP has filled the buffer(s) with DTBs for the SICP
during every time and has set the pointer(s), it generates a Data Transfer Interrupt
slot. (DTI) to the SICP. This interrupt is generated even when the
NICP has no data for the SICP. The SICP receives this
interrupt and reads the buffers. It then writes buffers contain-
ing DTBs for the NICP, using a second set of five pointers
and five buffers.
The End-of-Slot interrupt and the DTI each occur once during
every time slot. Together they control the orderly exchange of
information in both directions between the NICP and SICP.
By counting the DTIs, the SICP is able to maintain a slot
count.
LK16/4-08M-012
Figure 4-11. End-of-Slot Interrupts and Data Transfer Interrupts (DTIs) control the exchange
of data between the NICP and SICP.
Status DTBs ■
Every 12 seconds, the NICP provides the SICP with a status
report that details the number of messages transmitted during
the last interval, the number of Round Trip Timing (RTT)
interrogations transmitted, the number of replies received,
the number of transmissions received in error, the number
of messages not acknowledged, counts on loopback failures,
the Interference Protection Feature (IPF) status, the crypto
status, the relay status, and built-in test (BIT) status for the
Receiver/Transmitter (R/T), Plain Text Processor (PTP), and
Crypto Text Processor (CTP).
Section H
Housekeeping Words
Housekeeping The Plain Text Processor (PTP) has access to Global
words provide Memory by means of the Plain Text Bus. During every
information time slot, the NICP provides the PTP with 35 housekeeping
necessary for words. These words contain decryption information for
encryption and slot n and encryption information for slot n+1, as well as
decryption of transmission control information, such as the message
messages. header, source track number (STN), which location of the
Secure Data Unit (SDU) encryption device to use for
message security (MSEC), which to use for transmission
security (TSEC), time adjustments for antenna cable delays,
and so on.
During every time slot, the PTP provides the NICP with 18
words reflecting input status, external time references, a
relay tag, the SDU serial number, a unique variable update
number, the R/T BIT status, the PTP BIT status, and so on.
Input status includes a message-received indicator, antenna
identification, and SDU status.
Housekeeping List
Housekeeping List PTP to NICP
NICP to PTP
■ Variable for Slot n + 1 ■ Status
■ Variable for Slot n ■ External Time Reference
■ Time of Day for Slot n ■ Relay Tag
■ Time of Day for Slot n + 1 ■ SDU Serial Number
■ Message Header ■ Unique Variable Update Number
■ STN ■ Receiver / Transmitter Built-in Test
■ Message Transmit Control – Word 1
■ Slot Type n + 1 – Word 2
■ TOA Adjustment Antenna A – Word 3
■ TOA Adjustment Antenna B – Word 4
■ TOA Adjustment Sum ■ PTP Built-in Test
■ Receiver Thresholds – Word 1
■ Time Quality – Word 2
■ Track Number Addressee for RTT
■ Receiver / Transmitter Initialization
■ Receiver / Transmitter Control
■ Transmit Time
LK16/4-08M-015
■ Location of Receive Buffer
■ Location of Transmit Buffer
■ Time Correction
■ SDU Zeroing
Figure 4-12. Information is exchanged between the NICP and the PTP
through a list of housekeeping words in Global Memory.
DTI
End-of-Slot End-of-Slot
Interrupt Interrupt
LK16/4-08M-013
Figure 4-13. The PTP reads and writes data for the NICP in the period between 5.6 msec and
7.8 msec after the end-of-slot interrupt. The NICP retrieves this information when it reads
buffers during the next time slot.
Section I
Voice Transmission/
Reception
Link-16 includes two secure voice channels, or ports. Both
port 1 and port 2 operate at 16 kilobits per second (kbps). In
addition, port 1 is capable of interfacing to an external voice
encoder (vocoder) that can operate at either 2.4 kbps or 4.8 Both Link-16
kbps. Thus the system is capable of supporting Reed- secure voice
Solomon-encoded voice. However, only non-error-corrected channels are
voice at 16 kbps is implemented aboard the Navy shipboard push-to-talk
platforms. The voice audio is digitized within the IU of the (PTT).
terminal. Control of each voice channel is provided by a
Push-to-Talk (PTT) protocol. Note that even though the
digitized voice is not encoded for error correction, it is still
encrypted, and is therefore secure.
"Black Lion 201 . . RTB . . your steer
for Home Plate is two, seven, " Fire Horse, this is Wee Willie . . .
zero . . fifty". your unrep time with Twinkle Toes
is fifteen thirty today. . . "
1 2 3 FO
4 5 6F
78 9I
ROCP
ASDS-
11M-018
4a
-01
8M
/4-0
II LK
16
Figure 4-14. The Link-16 network may include two secure voice ports operating without
error encoding at 16 kbps. Voice continues to operate when the terminal is set to Data
Silent.
When the Digitized voice data is transferred between the SICP and the
operator presses two digital voice ports through several buffers located in
the PTT button, Global Memory. The SICP supplies two transmit buffers and
two voice buffers two receive buffers for each voice port. The voice buffers
are alternately hold a maximum of 450 bits, as required for non-error-
filled with corrected digitized data. Upon a PTT command, the voice
digitized voice port obtains the transmit buffer address from Global
data. Memory and starts loading the buffer with digitized voice.
When the buffer is full, it sets a flag to notify the SICP and,
if the PTT signal is still present, begins loading the second
transmit buffer. The SICP unloads the data and transfers it in
a DTB to the NICP for transmission. After the second buffer
is full, the voice port signals the SICP and switches back to
the first.
Alternately switching back and forth between the two buffers
continues until the PTT is removed. Computer programmers
call this double-buffering. When the PTT is removed, the
voice port switches to reception processing.
During voice-
receive, digitized When the SICP receives a voice message from the NICP, it
data is converted stores the received digital data in the first voice receive
back to audio. buffer and sets a flag for the voice port. The voice port
retrieves the digitized data as it becomes available. The SICP
alternates between the first and second buffers either until
there is no more data, or until the PTT is issued locally.
Unencoded JTIDS
secure voice Practical experience indicates that JTIDS voice remains
degrades more understandable with up to 10 percent of the transmission in
quickly than error, compared to 50 percent in error for encoded data.
encoded JTIDS JTIDS voice will degrade into unusability, therefore, before
data. JTIDS data does.
A
Push-to-Talk Port 2
AA AA
AAAA AA
AAA
SICP
DTBs To / From
NICP
Free Text JTIDS
Messages
Global Network
Memory
Port 1 Port 2
Optional 2.4 kbps 16 kbps
LK16/4-08M-074
External only
Vocoder 4.8 kbps
16 kbps
Section J
The TACAN Port Interface
The JTIDS
TACAN function Tactical Air Navigation (TACAN), which is used by the
replaces existing airborne platforms, is one of the functions supported by
airborne TACAN the JTIDS terminal. In the airborne platforms, the JTIDS
equipment. terminal replaces the ARN-118 TACAN. The TACAN port
of the terminal provides the interface between the host
avionics and the terminal R/T and DDP.
■ Channel
Input JTIDS Terminal R/T
■ Mode
TACAN Modes
■ Receive
■ Transmit / Receive
■ Distance Output
LK16/4-08M-075
■ Air-to-Air Receive
■ Bearing
■ Air-to-Air Interrogator / Transponder
■ Audio Identification
5
C
H
A
P
T
E
R
Introduction
This chapter describes the JTIDS communications architecture known as TDMA (time
slots, sets, and RRNs), the general data structures supported by the network architecture
(fixed format, free text, headers, Reed-Solomon encoding, and RTTs) and the
modulation techniques for encoding this data onto a carrier for transmission during the
time slots (CCSK, CPSM, pulses, and frequency hopping).
Section A
TDMA and the JTIDS
Network
The JTIDS network employs a communications architecture
known as Time Division Multiple Access (TDMA). This
architecture uses time interlacing to provide multiple and
apparently simultaneous communications circuits. Each
circuit, and each participant on the circuit, are assigned
specific time periods during which to transmit and in which
to receive. This TDMA architecture forms the framework
of Link-16 communications.
Every 24-hour day is divided by the JTIDS terminal into The time slot is
112.5 epochs. An epoch is 12.8 minutes in duration. An the basic unit of
epoch is further divided into 98,304 time slots, each of access to the
which is 7.8125 milliseconds (msec) in duration. JTIDS network.
The time slot is the basic unit of access to the JTIDS A JU is either
network. These units, the time slots, are assigned to each transmitting or
participating JTIDS Unit (JU) for particular functions. A receiving in each
JU is assigned either to transmit or to receive during each time slot.
time slot.
12
11 1
10 2
7 5
6
.........................
0 98,303
Each epoch is divided into
98,304 time slots. A-32766
B-32766
C-32766
A-32767
B-32767
C-32767
...........
B-0
C-0
A-1
B-1
C-1
A-2
B-2
C-2
A-3
B-3
C-3
A-4
B-4
C-4
A-0
SECONDS
Each time slot is 7.8125
msec in duration.
WF16-08M-003
n 2n
0 1
1 2
2 4
3 8
4 16
5 32
6 64
7 128
8 256
9 512
10 1024
11 2048
12 4096
13 8192
14 16384
15 32768
Recurrence Rate ■
The logarithm of the number of slots in the time slot block is
called the recurrence rate number (RRN). The recurrence
rate indicates how many time slots are in the block and, since
The RRN is used they are evenly distributed, how often they occur. The entire
to assign how set of time slots in set A is 32,768 or 215. It is distributed
often a JU every 3rd slot and is identified by the notation A-0-15. Half of
accesses the the slots in set A would be 16,384 time slots. They would
JTIDS network. occur every 6th slot and would be designated by an RRN of
14. Half of these would occur every 12th slot and would be
designated by an RRN of 13.
15 32768 3 23.4375
14 16384 6 46.8750
13 8192 12 93.7500
msec
12 4096 24 187.5000
11 2048 48 375.0000
10 1024 96 750.0000
9 512 192 1.50
8 256 384 3.00
7 128 768 6.00 seconds
6 64 1536 12.00
5 32 3072 24.00
4 16 6144 48.00
3 8 12288 1.6
2 4 24576 3.3
minutes
1 2 49152 6.4
0 1 98304 12.8
Frames ■
The 12.8-minute epoch is too unwieldy a time interval for
describing the rapid communications required by Link-16, so
a smaller, more manageable, time interval is defined. This is
Each epoch is divided the basic recurring unit of time in the JTIDS network and is
into 64 frames. called a frame. There are 64 frames per epoch. Each frame
is 12 seconds in duration and is composed of 1536 time
At 12 seconds each, slots: 512 belonging to set A, 512 belonging to set B, and
a frame is a more 512 belonging to set C. The time slots of a frame are
manageable unit of numbered from 0 to 511 and are interleaved in a repetitive
time than the epoch. cycle such that A-0, B-0, C-0 are followed by A-1, B-1,
C-1 — and are preceded by A-511, B-511, C-511. Frames
occur repeatedly, with one following another, for as long as
the link is operational. For this reason, a frame is often
illustrated by a ring in which slot A-0 follows slot C-511.
12 seconds
15 512 1 3 23.4375
14 256 2 6 46.8750
msec
13 128 4 12 93.7500
12 64 8 24 187.5000
11 32 16 48 375.0000
10 16 32 96 750.0000
9 8 64 192 1.50
seconds
...
A-16389
... ...
A-24581
A-12293
WF16/5A-108M-006
...
AA AA
...
AA
AAAA AAAA
A A
A-28677
A-8197
AA
AAAA
AAAAA AAAA
AAAAA
... 1.6 min ...
A-4101
A-5
AAAA
AAAAAAAAAAAAAAA
...
A-5-3
set index RRN
Notice also that if the index of a time slot block is even, all
the time slot numbers in that block are also even. If the
index of a time slot block is odd, all the time slot numbers in
that block are also odd.
12 second interval
RRN Slots/
Frame
Set C TSBs
15 512 C - 0 - 15
14 256 C - 0 - 14 C - 1 - 14
13 128 C - 0 - 13 C - 2 - 13 C - 1 - 13 C - 3 - 13
12 64 C - 0 - 12 C - 4 - 12 C - 2 - 12 C - 6 - 12 C - 1 - 12 C - 5 - 12 C - 3 - 12 C - 7 - 12
C-0-11 C-8-11 C-4-11 C-12-11 C-2-11 C-10-11 C-6-11 C-14-11 C-1-11 C-9-11 C-5-11 C-13-11 C-3-11 C-11-11 C-7-11 C-15-11
11 32
RRN Slots/
Frame
10 16 Set B TSBs
15 512 9 8 B - 0 - 15
14 256 8 4 B - 0 - 14 B - 1 - 14
13 128 7 B2
- 0 - 13 B - 2 - 13 B - 1 - 13 B - 3 - 13
12 64 6 B - 0 - 121 B - 4 - 12 B - 2 - 12 B - 6 - 12 B - 1 - 12 B - 5 - 12 B - 3 - 12 B - 7 - 12
B-0-11 B-8-11 B-4-11 B-12-11 B-2-11 B-10-11 B-6-11 B-14-11 B-1-11 B-9-11 B-5-11 B-13-11 B-3-11 B-11-11 B-7-11 B-15-11
11 32
RRN Slots/
10
Frame 16 Set A TSBs
15 5129 8 A - 0 - 15
14 2568 4 A - 0 - 14 A - 1 - 14
13 1287 2A - 0 - 13 A - 2 - 13 A - 1 - 13 A - 3 - 13
12 646 A - 0 -112 A - 4 - 12 A - 2 - 12 A - 6 - 12 A - 1 - 12 A - 5 - 12 A - 3 - 12 A - 7 - 12
A-0-11 A-8-11 A-4-11 A-12-11 A-2-11 A-10-11 A-6-11 A-14-11 A-1-11 A-9-11 A-5-11 A-13-11 A-3-11 A-11-11 A-7-11 A-15-11
11 32
10 16
9 8
8 4
WF16/5A-08M-005
7 2
6 1
Figure 5-7. Time slot blocks are interrelated in a tree-like structure. Simultaneous
transmissions can occur when TSB assignments intersect.
Problem: To determine whether two TSBs within the same set defined by
starting slot indices of S0 and S1 with respective RRNs of r0 and r1
are mutually exclusive.
Solution: Step 1. Label the TSBs such that S0 is assigned to the larger index.
Step 2. Calculate S 0 – S1
215 – r 1
Conclusion: If the result is an integer, there's an intersection and the TSBs are
not mutually exclusive.
Figure 5-8. One method for determining whether two TSBs are mutually exclusive is to list
all the slots belonging to each. An alternative method is described above.
Single Net
.
.
A- 32766
B- 32766
.
.
C- 32766
A- 32767
B- 32767
C- 32767
.
.
C- 1
.
.
B- 1
A- 1
.
C- 0
.
B- 0
A- 0
Time Slot
Figure 5-9. The JTIDS single net architecture divides each 12.8-minute
epoch into 98,304 time slots.
Multiple Nets ■
Link-16 Multiple nets can be constructed by “stacking” several single nets,
supports as illustrated in Figure 5-10. The time slots of these nets are
multiple, synchronized so that a time slot of one net coincides exactly with
simultaneous the corresponding time slot of every other net. Thus the multinet
nets. architecture contains 98,304 time “slices” per epoch.
Multiple Nets
Time Slice Time Slot
Net
Number
126
125
124
123
50
49
48
47
2
WF16/5A-08M-
0
.
.
A- 32766
B- 32766
.
.
C- 32766
A- 32767
B- 32767
C- 32767
.
.
C- 1
.
.
B- 1
A- 1
C- 0
.
.
B- 0
A- 0
Time Slot
Figure 5-10. The JTIDS multinet architecture stacks 127 of these single net
structures with their time slot boundaries aligned. This multi-net architecture
can be conceptualized by imagining a cylinder of 98,304 time slices.
Synchronization ■
In order to establish a synchronized network, a single
terminal must be designated to provide the time reference.
The JTIDS This terminal is called the Net Time Reference (NTR). The
terminal time maintained by this designated terminal defines the
automatically system time of the JTIDS network. As the reference, this
synchronizes to time defines the beginning and end of time slots and ensures
the system time the alignment of time slices in the multiple nets. Periodically
of the NTR. the NTR transmits a net entry message to assist other
terminals in synchronizing with the network and thereby
acquiring system time.
■ jitter
■ synchronization
■ time refinement
■ message header and data
■ propagation
The slot starts with a delay or dead time, called jitter, in Jitter contributes
which no pulses are transmitted. The amount of jitter varies to transmission
from time slot to time slot in a pseudorandom way that is security by
determined by the TSEC cryptovariable. Jitter contributes to causing the start
time of a
the antijam nature of the signal by making it difficult for a
transmission
jammer to know when to turn on the jamming signal. to vary.
Propagation
Time Refine
Jitter
Sync
Message
(Header & Data)
126
Nets
WF16/5A-08M-008
Figure 5-11. The time slot contains the following components: jitter,
synchronization, time refinement, message header and data, and
propagation. During the synchronization, time refinement and message
header and data portions of the time slot, a sequence of symbols encoded
into information-carrying pulses is transmitted. The jitter and
propagation portions are dead times in which no pulses are transmitted.
Finally, the end of the slot is marked by a guard period which A guard period at
allows for the propagation of the signal. The propagation the end of the time
guard time allows for a normal range of 300 nautical miles slot provides time
or an extended range of up to 500 nautical miles, depending for the signal to
on the network's range setting. propagate.
1 Day = 24 hours
= 112.5 Epochs
1 Epoch = 12.8 minutes
= 64 Frames
= 98,304 Time Slots
= 32,767 Time Slots/Set
1 Frame = 12 seconds
= 1,536 Time Slots
= 512 Time Slots/Set
128 Time Slots = 1 second
1 Time Slot = 7.8125 milliseconds
Section B
Link-16 Messages
Link-16 messages are exchanged during the TDMA time
slots of the JTIDS network. Each message consists of a
message header and message data. The message header is
not considered part of the message structure and is the same
for IJMS and JTIDS. The message header specifies the type
of data and identifies the source track number of the transmit-
ting terminal.
Four types of messages are defined:
■ fixed format
■ variable format
■ free text
■ round-trip timing
Fixed-Format Messages ■
The fixed-format messages consist of one or more words, up
to a maximum of eight. Each word consists of 75 bits, of
which 70 are data, 4 are used for parity checks, and 1 is
reserved as a spare. Three types of words are defined: the
initial word, the extension word, and the continuation
word. Fixed-format messages consist of an initial word, one
or more extension words, and one or more continuation
words. If there are an insufficient number of 75-bit words to
fill a transmit block, the terminal pads the block with No
Statement (NS) words. Message metering in the host com-
puter helps to minimize the number of NS words inserted by
the terminal.
Initial Word
Word
Message
Parity Information Fields Sub-Label Label Format
Length
00
74 70 13 10 7 2 0
Extension Word
Word
Parity Information Fields Format
10
74 70 2 0
Continuation Word
Word
Parity Information Fields Continuation Format
Label
01
74 70 7 2 0
WF16/5B--08M-001
■ Parity Checking
Fixed format messages are always encoded for parity
checking. Bits 4 through 18 of the message header, which
contain the source track number, are used in conjunction
with the 210 data bits of the 3 data words to calculate a 12-
bit parity value. These parity bits are distributed at bit
positions 71-74 of each 75-bit word. Bit 70 of each word is
reserved as a spare.
■ Parity Checking
Fixed format messages are always encoded for parity
checking. Bits 4 through 18 of the message header, which
contain the source track number, are used in conjunction
with the 210 data bits of the 3 data words to calculate a 12-
bit parity value. These parity bits are distributed at bit
positions 71-74 of each 75-bit word. Bit 70 of each word is
reserved as a spare.
Variable-Format Messages ■
Like fixed-format messages, variable-format messages consist of
75-bit words. Variable format messages, however, may vary both
in content and length, and fields within the message can cross word
boundaries. Information within the message itself identifies the
fields and their length. The U.S. Army uses this format to exchange
ATDL messages between units — over the JTIDS network!
WF16-/5B-08M-002a
Free-Text Messages ■
Free-text messages are independent of any message standard.
They are unformatted and utilize all 75 bits in the data word —
all 225 data bits in the 3-word block.
Digital Data
74 0
WF16-/5B-08M-002b
Message Packing ■
Message words may be taken in groups of 3 words, 6 words, or
12 words to form transmissions. If there are an insufficient number
of words to complete a group, the terminal fills in with a “no
statement” word. The processing of a group of 3 words is called
Standard (STD) format. The processing of a group of 6 words is
called Packed-2 (P2) format. The processing of 12 words is called
Packed-4 (P4) format.
Message Header ■
The message header specifies whether the message to follow is
fixed format, variable format, or free text. It identifies whether the
message is encoded or unencoded, and which packing structure has
been used. It also identifies the serial number of the Secure Data
Unit and the track number of the source terminal.
Header
P
SDU Serial Numb er Source Track Numb er Typ e
R
34 19 4 3 0
WF16/5B-08M-010b
Figure 5-17. The message header specifies the type of data and identifies
the source track number of the transmitting terminal. The bits of the
header are also used in the calculation of parity for each 3-word group.
P/R, the Type Modifier bit, provides packing or relay information.
The message header contains 35 bits. These are R-S encoded with
a (16, 7) algorithm such that the 35 bits become 80 bits. These are
taken five at a time to form an R-S header codeword containing
16 symbols.
Parity
■ 70 Bits → 75 Bits
R-S Encoding
■ 15 Bits → 31 Bits
Conversion to
5-bit symbols
■ 5 Bits → 1 Symbol
WF16/5B-08M-015
Symbol Interleaving ■
The packing structure is specified in the header, along with
the track number—which is required for parity checking.
Ah Ha! A jammer could interfere with the exchange of data
by jamming the header — if he could find it.
Symbol
Interleaving
34
76
57
31
10
3
24
29
62
83 10
4 6 2
7 92 10 30 70 23
WF16/5B-08M-022
Figure 5-19. Symbols of message data and header data are interleaved.
The RTT-B, on the other hand, contains the interrogator’s Qt . RTT-Bs are
It is not addressed to a specific recipient, and any terminal transmitted on
with a higher value can reply. It is typically used with a NPG 3.
stacked net structure. Terminals receive interrogations and
transmit replies on the net number equal to their own Qt .
They transmit interrogations on the net number equal to the
Qt of the desired recipient, as determined from their internal
table.
RTT Interrogation
Type A (Addressed)
Type
SDU Serial Number Source Track Number 0 010
34 19 4 3 0
Type B (Broadcast)
Time Type
SDU Serial Number Spare 1 010
Quality
34 19 14 4 3 0
RTT Reply
34 19 0
WF16/5B-08M-010a
RTT-I RTT-R
Replier: Received Transmit-
ted
RTT-I RTT-R
Interrogator: Transmit- Received
ted
TOA
TOAi Propagation time (t p) = TOAi – E
E tp
tp
E TOA r
Reply t p = Interrogation t p
Figure 5-22. The exchange of RTT messages allows the interrogating unit to improve its
estimate of system time by calculating the error in its clock.
Section C
Inside the Time Slot
In order to communicate digital information over a radio, the
RF carrier must be modulated with the digital data. The
method used to encode digital data onto the JTIDS carrier
has two parts: Cyclic Code Shift Keying (CCSK) and
Continuous Phase Shift Modulation (CPSM).
DIRECTION OF SHIFT
5-Bit
32-Chip Sequence (CCSK Code Word)
Symbol
00000 S0 = 01111100111010010000101011101100
00001 S1 = 11111001110100100001010111011000
00010 S2 = 11110011101001000010101110110001
00011 S3 = 11100111010010000101011101100011
00100 S4 = 11001110100100001010111011000111
•
•
•
11111 S31 = 00111110011101001000010101110110
Pseudorandom Noise ■
To increase the transmission security of the JTIDS signal, the
32-chip sequence is exclusively or’d (XOR) with a 32-chip sequence
of pseudorandom noise (PN). The resulting chipping sequence is
often called a transmission symbol. This PN code is determined by
the TSEC cryptovariable and is continuously changing. As a result,
when the data is finally transmitted, it looks like incoherent noise.
Interleaved Reed-Solomon Encoded Data (465 bits) and Header (80 bits)
5-bit
Symbol • • •
XOR
WF16/5C-08M-018
Carrier Modulation ■
The waveform is generated by Continuous Phase Shift
Modulation (CPSM) of the carrier frequency at a 5-megabit-
per-second rate using the 32-chip sequence of the trans-
mission symbol as the modulating signal. With a 5-MHz
chipping rate, the duration of each chip is 200 nanoseconds;
0.000000200 seconds.
10........1.......110 0111......0......10
1 1 0 0 1 1
Single Pulse
Figure 5-25. The carrier is encoded with the chipping sequence by shifting the
modulating signal between two frequencies The frequencies are chosen so that the
modulating signal is phase-continuous. If the chip is the same, the lower frequency is
used. If the chip is different, the upper frequency is used.
Single Pulse
6.4 6.6
13 µsec
Double Pulse
WF16/5C-08M-014
26 µsec
The header always uses the double pulse format, but the The header
packing structure of the data can vary for each time slot. component is
Part of the information specified in the header is the packing always transmitted
structure of the data. redundantly — as
double pulses.
SP
RTT 2(0)
DP 0 0 0 0 0 2(1)
SP
STD
Fixed Format
P2
DP 6: 420 + 30 = 450, 930 5(r)
P4
DP
SP
STD
DP N/A: 450 + 0 = 450, 450 0(0) 3: 210 + 15 = 225, 465 6(0)
*
Free Text
SP N/A: 1800 + 0 = 1800, 1800 * 1(1) 12: 840 + 60 = 900, 1860 2(1)
WF16/5C-08M-017
P4
DP
Only 450 of each available 465 bits are used so that a single assignment of (r) = relay indicator
*time slots is compatible with standard line rates of 2400 bps, 4800 bps, . . .
N/A = not applicable
Figure 5-27. Using the Type and Type Modifier fields, the header defines the
packing structure of the data that follows. This table summarizes the number
of words and data bits for fixed format and free text, unencoded and encoded
messages for each type of packing structure.
The following illustrations of the time slot structures are not to time
scale. The header and data are shown separately to illustrate clearly
the increased data capacity associated with each packing structure.
In actuality, of course, the header and data symbols are interleaved.
The STD-DP header and data portion of the time slot consists of 109 The redundancy
interleaved symbols. This represents 225 bits of coded information, of the STD-DP
or 465 bits of uncoded data. Recall that the header and data portion packing
of a Standard message consists of three 75-bit data words and one structure
makes it
35-bit header. These are Reed-Solomon encoded to 465 bits and
the most
80 bits, respectively. These bits are then taken five at a time to
reliable
generate 93 32-chip transmission symbols for the data and 16 32- type of
chip transmission symbols for the header. The data and header transmission.
symbols are interleaved. The total time taken to transmit 109
double pulse symbols is 2.834 msec.
Jitter S TR H D1 Propagation
16x2 4x2 16x2 93x2
Figure 5-28. The STD-DP time slot structure contains a variable amount
of jitter, 3.354 msec of symbol packets representing synchronization, time
refinement, header, 225 bits of encoded Link-16 message data, and a
variable amount of propagation time. The header and data are actually
interleaved.
Jitter S TR H D1 D2 Propagation
16x2 4x2 16x2 93x1 93x1
Figure 5-29. The P2SP time slot structure contains a variable amount of
jitter, 3.354 msec of symbol packets representing synchronization, time
refinement, header and 450 bits of encoded Link-16 message data, and a
variable amount of propagation time. The header is transmitted
redundantly (double pulses), the data is transmitted only once
(single pulses).
S TR H D1 D2 Propagation
16x2 4x2 16x2 93x2 93x2
Figure 5-30. The P2DP time slot structure contains no jitter. The 5.772
msec of symbol packets represent synchronization, time refinement,
header and 450 bits of encoded Link-16 message data. The remaining
time is reserved for propagation.
S TR H D1 D2 D3 D4 Propagation
16x2 4x2 16x2 93x1 93x1 93x1 93x1
Figure 5-31. The P4SP time slot structure contains no jitter. The 5.772
msec of symbol packets represent synchronization, time refinement,
header and 900 bits of encoded Link-16 message data.
Section D
The JTIDS RF Signal
The JTIDS signal is transmitted in a radio frequency (RF)
band in the UHF portion of the spectrum. UHF communica-
tions are always line of sight. Line of sight is normally 150 nm
for ship-to-air and 300 nm for air-to-air. But it is only 25 nm
for ship-to-ship. To achieve Battle Group connectivity,
therefore, Link-16 requires the use of relays.
The Lx Band ■
The portion of the frequency spectrum between 950 MHz
and 1150 MHz is called the L x Band. JTIDS operates within
this band. Also operating within this band are civilian and
military air navigation systems, including civil Distance
Measuring Equipment (DME) and military Tactical Air
Navigation (TACAN) equipment. DME and TACAN
channels occur every 1 MHz within this band.
Frequenc
AA AAAAAAAAAAAAAA A
300 KHz 3 MHz 30 MHz y 300 MHz 3 GHz 30 GHz
A
AA
A
MF A
A A
A A
A A
A A
A A
A A
A
HFA
A A
A A
A A
A A
A A
A A
A
VHF UHF SHF AA
WF16-/5D-08M-020
AA A A A A A A A A A A A A A A AA
L Band
AA AAAAAAAAAAAAAA
Lx
Figure 5-32. The portion of the spectrum used for JTIDS communications is in the UHF band.
UHF communications are line of sight.
JTIDS Frequencies ■
JTIDS operates in JTIDS operates in the Lx band between 960 MHz and
the 960 to 1215 1215 MHz. The 51 frequencies assigned to JTIDS for
MHz band, with TDMA transmissions are those between 969 MHz and
JTIDS frequencies 1206 MHz, 3 MHz apart. Two sub-bands centered on
occurring every 1030 MHz and 1090 MHz are excluded because they are used
3 MHz between by IFF. In Mode 1, each pulse is transmitted on a different
969 MHz to frequency in a pseudorandom pattern that depends on the net
1206 MHz. number and the TSEC cryptovariable. In Mode 2, all pulses
are transmitted at 969 MHz.
Figure 5-33. For every pulse, the JTIDS carrier is changed to one
of 51 possible frequencies. The nominal frequency-hopping rate is
greater than 33,000 hops per second.
DME ■
DME DME is a civilian navigation system consisting of an airborne
frequencies interrogator and ground transponder. The interrogator
occur every transmits about 30 pulse-pairs per second on one of
1 MHz between 126 channels between 1025 and 1150 MHz. The transponder
962 MHz and replies on one of 126 channels at 962 to 1024 and 1151 to
1213 MHz. 1213 MHz. An indicator in the aircraft’s cockpit displays the
transmit-to-receive time on a meter calibrated in nautical
miles. The DME ground transponder is often co-located with
a VHF Omnidirectional Range (VOR) transmitter to
provide an aircraft with both distance and direction. The
VOR operates on frequencies outside the JTIDS band,
between 108 and 118 MHz.
TACAN ■
TACAN is a military navigation system which combines the
distance and direction function into a single system. The
TACAN ground unit transmits a DME beacon (for distance)
Thousands of to which is added a rotating cardioid antenna pattern plus a
VORTAC 9-lobed pattern (for direction). The pattern rotates 15 times a
stations second generating a 15-Hz coarse-bearing signal. The
throughout the 9 lobes rotating 15 times a second generate a 135-Hertz
U.S. provide fine-bearing signal. Military aircraft translate the received
civilian and signal into a visual presentation of both azimuth and distance.
military aircraft
with distance In the U.S. and some other countries, the distance-and-
and directional direction navigation system is often implemented by
information co-locating VOR and TACAN stations to create a VORTAC
necessary for station. The VORTAC is a unified (civilian and military)
navigation. navigational aid. Both components operate simultaneously at
all times to provide three services at one site: VOR azimuth,
TACAN azimuth, and TACAN distance (equivalent to DME).
115.3
MILES MIN KNOTS
96:00
DME 60
0 90
180
FROM
270
n
tio Hz nse MHz z
ga M ) spo
t e rro 1150 nels Re 1024 3 MH ) 33
In 5 – han – 121 els 0
2 c 96251 – hann
10 (126 11 126 c 30
(
3
27
6
SANTA BARBARA
24
114.9 CH 96 SBA
9
VOR TACAN / DME
Frequency Channel
21
12
18
15
Figure 5-34. Link-16 shares the L x Band with civilian and military navigation systems.
IFF ■
The Air Traffic Control Radar Beacon System (ATCRBS)/
Identification Friend or Foe (IFF) uses sub-bands centered on
1030 MHz and 1090 MHz. A ground-based interrogator at 1030
MHz transmits about 400 pulse-pairs per second. Replies from the
aircraft transponder are received at 1090 MHz, pulse-coded with
identity, altitude, and other information essential in identifying
the aircraft.
Mode S IFF ■
Mode Select Beacon System (Mode S) IFF is a combined beacon
radar and ground-air-ground data link system that replaces the
ATCRBS. It is backwards compatible with ATCRBS, using the
same frequencies for interrogation and reply.
A
Transponder
Code 2001
Hz
M
Hz
30
M
10
0
09
ns
)1
tio
..
ga
e.
ro
ter
ud
ltit
In
,A
(ID
es
pli
Re
Interrogator
Code 2001
LK16/5-08M-025
Figure 5-35. Notch filters on the JTIDS terminal transmitter prevent the JTIDS signal from
encroaching on the ATCRBS/IFF bands.
IFF IFF
960
1030 1090 1215
WF16/5D-08M-019
Figure 5-36. JTIDS, IFF, TACAN and DME transmissions use the same frequency band.
Within this band, TACAN and DME channels occur every 1 MHz. JTIDS center frequencies
occur every 3 MHz, with notches at 1030 MHz and 1090 MHz for IFF.
Interference ■
The JTIDS terminal must continue to operate on Link-16 in The frequency
the presence of interfering signals from the IFF interrogator, band in which
the AIMS transponder, TACAN interrogators, and its own JTIDS must
built-in TACAN function, as well as interfering signals from operate is flooded
TACAN interrogators aboard adjacent platforms. An with low-level RF
airborne TACAN interference environment might consist of signals.
as many as 60 interrogators in search mode and 540
interrogators in track mode. These interfering signals are JTIDS
distributed uniformly in frequency over the entire TACAN transmissions
band and located such that the peak signal level from each is must not interfere
– 42 dBm. A ground beacon environment typically has a with the operation
beacon on every ground-to-air channel, each transmitting of the systems
3600 pulse-pairs per second. The power level associated relying on these
with 50 beacons is – 60 dBm. low-level signals.
■ Normal
■ Exercise Override
■ Combat Override
■ Normal
■ Exercise Override
■ Combat Override
TSDF ■
Time slot duty factor (TSDF) is a measure of JTIDS pulse
density. A TSDF of 100% is defined as 396,288 pulses per
12-second frame. This density is realized when a transmission
A TSDF of 100% with Standard or Packed-2 Single Pulse packing (containing
is 396,288 pulses 258 pulses) occurs in every one of the 1,536 time slots of the
per 12-second frame (258 x 1536 = 396,288). It would also be closely
frame. approximated by 892 time slots at Packed-2 Double Pulse or
Packed-4, each of which contains 444 pulses (444 x 892 =
396,048).
FAA Restrictions ■
JTIDS operates within the frequency band allocated for
aeronautical radio navigation and controlled by the FAA.
Thus, coordination with and approval by the FAA is required
for JTIDS operations within 200 nm of the U.S., its
territories and possessions. NAVEMSCEN coordinates
frequency assignments and is the DOD point of contact for
JTIDS spectrum management issues. Geographic
deconfliction within a given area is further coordinated
through the Geographic Area Assignment Controller
(GAAC). A JTIDS/MIDS Deconfliction Server is
maintained to support this coordination among the services.
The following restrictions are typical:
6
C
H
A
P
T
E
R
Structuring the
Link-16 Network
Introduction
The previous chapter focuses on the physical structure of the JTIDS network. The focus
of this chapter is on its logical structure. The logical structure is mission-oriented and
based on fleet requirements. Many different logical structures are possible. They are
currently designed by the Naval Research and Development Division (NRaD) of the
Naval Command Control and Ocean Surveillance Center (NCCOSC) located in
Warminster, Pennsylvania, and are collected into a library stored on magnetic tapes.
Networks are operationally oriented, and are designed to meet fleet requirements. Even
though the operator has almost no control over defining the network structure, an
understanding of how it is designed and how it works is helpful in recognizing problems
and diagnosing their probable cause. Knowledge of the logical structure of the network
also enables an operator to distinguish between the limitations that are inherent in the
JTIDS waveform and those that are part of the design of a particular network.
6-1
Section A
Participation Groups
Superimposed on the physical structure of the JTIDS network
is a logical structure that allows it to be adapted to specific
operational environments or needs. This adaptation is
accomplished by apportioning the network capacity among
multiple “virtual circuits” whose transmissions are dedicated
to a single function. Participants are then assigned to these
circuits, or functional groups, as required by their mission
and their capabilities.
Participation There are also functional groups which support the operation
Groups are the of the network, including Initial Entry and RTT. All of these
functional functional groups are known as Network Participation
building blocks of Groups, or NPGs. The transmissions on each NPG consist
a network. of messages which support its particular function.
The NPGs 32 through 511 are assigned for the Needline participation
groups. Needline participation groups are address-oriented and require
that a destination address be specified. They are used strictly for intra-
Army communications. The data exchanged in the needline groups
consists of ATDL-1 messages embedded in the variable-format message
structure supported by JTIDS. Because the USN does not employ these
groups, they are not discussed further in this guidebook. All further
references to NPG will refer to the subject-oriented Network Participation
Groups.
Participation
Group Contents Used By
NPGs ■
Network capacity NPGs support operational communications needs. They allow
is assigned first to the network designer to separate the functions implemented in
NPGs, and then the J-series messages. Network capacity is first allocated to
to users NPGs, and then to the users that participate in that NPG. The
participating in following paragraphs briefly describe each NPG that is
that NPG. currently defined. NPGs can be divided into two basic
categories: those used for the exchange of tactical data,
including voice, and those required for network maintenance
and overhead.
This NPG performs the same function as NPG 2, but the time
slots are shared by a group of JUs using an access method in
which all units can transmit. It is usually configured as a stacked
net, with the net numbers corresponding to values of the Time
Quality parameter — 0 through 15.
■ NPG 7: Surveillance
LK-16/6-08M-032a
Figure 6-2. The F-14D depends on the Air Control uplink from its
controlling unit for situation awareness. Radar targets, pilot responses,
and status reports are transmitted to the controlling unit on the Air
Control backlink.
Net 6
Air Control
t6
Ne
Net 3
Air Control
Ne
t3
47
Net 6
LK/6-08M-032b
Net 5
Net 4
Net 3
Net 2
Net 1
Net 1 Net 0
Air Control
t1
Ne
Net Backlink
6 16 Fighters
5
UPLINK
4
3 4 Fighters
2
1 8 Fighters
0
Capacity Allocation
Figure 6-3. The Air Control NPG’s uplink and backlink typically contain commands to the
fighters, responses from the fighters, fighter engagement status, and target reports. Air
Control is configured as a stacked net, with each C2 unit and its fighters assigned to a
different net. The backlink time slots can be allocated to 4, 8, or 16 fighters.
A small portion of The U.S. Navy’s implementation of this NPG does not allow
the Fighter-to- F-14Ds to be simultaneously active on both the air control
Fighter NPG is backlink and the fighter-to-fighter NPGs. To retain
assigned to the communication between the USN controller and a group of
controlling C2 JU. fighters that have detached from control and are engaged in
This NPG serves the same purpose as NPG 19, but the time
slots are allocated for contention access. Contention access is
preferred by the U.S. Air Force, and participants on this NPG
are typically F-15s.
NPG Function
1 Initial Entry
2 RTT A
3 RTT B
4 Network Management
5 PPLI and Status A
6 PPLI and Status B
7 Surveillance
8 Weapons Coordination
9 Air Control
10 Electronic Warfare
12 Voice Group A
13 Voice Group B
14 Indirect PPLI (Navy Only)
19 Fighter-to-Fighter Targeting (Dedicated)
20 Fighter-to-Fighter Targeting (Contention)
21 Engagement Coordination (Army Only)
27 PPLI (Joint Net Broadcast)
28 Distributed Network Management
29 Residual Message
30 IJMS Position & Status
LK16/6-08M-027
31 IJMS Message
NPG Buffering ■
Messages for up to three NPGs can be buffered in the JTIDS
terminal by the Subscriber Interface Control Program
(SICP). Buffering decreases the chances that a message will
be lost or dropped when message traffic is heavy. An
operator selects which NPGs to buffer. Valid choices are
Surveillance, Mission Management, Weapons Coordination,
Electronic Warfare, and Air Control.
Section B
Time Slot Assignments
The amount of network capacity assigned to a given NPG
depends on communications priorities, including:
Unit Types ■
JTIDS Units are of two basic types: the Command and Control
(C2) JUs and the non-Command and Control (nonC2) JUs. C2 JUs
are those platforms that have the requisite equipment, mission, and
personnel to exercise command and control authority. They direct
the activities of other platforms. In the U.S. Navy, the C2 JUs
include CVs and CVNs, CGs and CGNs, DDGs, LHDs, SSNs, and
E-2Cs. The nonC2 JUs are those whose activities are controlled or
monitored by the C2 JU. In the U. S. Navy, the only nonC2 JUs are
the F-14Ds and F/A-18s.
C2 NonC 2
USN CV, CG, DDG, LHD, SSN, E-2C F-14, F/A-18
USAF MCE, E3-A, E-8, ABCCC, MAOC F-15 LK16/6-08M-028
While several different access modes for each time slot block have
been proposed at one time or another, two are currently
in use and a third is in development:
■ Dedicated Access
■ Contention Access
■ Time Slot Reallocation Access
■ Dedicated Access
Dedicated Access
1
NPG 6 on net number _____
Access to _______
00034
is dedicated to JU ____________
32
in the amount of _______ time slots per frame
for transmission of its information.
Guarantee
There will be no interfering transmissions from any
other JU on this net. We guarantee it.
■ Contention Access
The assignment of time slots to a group of units as a pool for Several JUs
transmission purposes is known as contention access. In contention may transmit
access, each unit randomly selects a time slot from the pool during simultaneously
which to transmit. The frequency of a terminal’s transmission in contention
depends on the access rate assigned to that terminal. access.
Contention Access
00042 is hereby
JU ________
authorized to take time slots from a pool of
128
________ slots assigned for the
transmission of its information on NPG
64 slots
19 at a rate that shall not exceed ______
______
12 seconds.
every ______
Caution: There is no guarantee that the information you transmit will be
received. The probability of reception can be calculated and depends on the
number of intervening units contending for the same time slots, their access
rates, and their message traffic load.
AAA
AAA
AAA AAAAA
AAA AAAA
A
AAA AAA
AAAAAA
AAAA
A
AAAAA
AAA A
AAA
AAAAA
AAAAAAAA
AA
A AA A
AAA
AAAAA
AAA
AAAA
AAAAA
AAAAA AAA AAA AAAA
AAAA AAAA
AAAAA
AAA
AA
AA
A
AAAA AAAA
AAA
AAA
A
AAAA
AAA
A
AAAA
AA AAAAA
AAAA
A AAA
AAAAA
A
AAAAAAAAA
AA
AAA
AA
AA
AA AAAAA
AAAAA AAA AAAA
AAAA
AAA
AAA AA AAAAAAAAA
AAA
AA AA
AAA
AA
AA
Simultaneous
Silmultaneous
Transmissions
Transmissions
Period Period
Number Access Rate (Average, Number Access Rate (Average,
in Seconds) in Seconds)
Figure 6-8. Contention access allocates NPG capacity as a pool of time slots to a group of JUs.
Simultaneous transmissions are possible. These are avoided in the voice NPGs by the
incorporation of a Push-to-Talk protocol. If time slot reuse should occur, that is, if two units
transmit simultaneously in the same time slot on the same net, the transmission from the closest
unit will be the one that is received.
Section C
Network Roles
Network roles are functions assigned to a JU, either by
initialization or by operator entry. A network role can
support one or more of the following functions:
synchronization, navigation, and multilink operations. Roles
are assigned to C2 units and are made on the basis of platform
capabilities and expected platform position. With the
exception of Network Manager, all roles are terminal
functions. They may be changed during operations and
include:
Position Reference ■
The Position Reference (PR) must have a geodetic positional
accuracy within 50 feet, and should be assigned only to well-
surveyed, stationary sites. By definition, PRs are assigned a
position quality of 15. They provide a stable geodetic
reference for other units to use in determining their own
geodetic position via the RELNAV function. PRs also assist
the NC in refining the accuracy of the relative grid.
Networks can, however, operate without a PR.
Initial Entry JU ■
An Initial Entry JU (IEJU) assists in the propagation of The IEJU
system time to units that are beyond line of sight of the NTR. provides system
After the IEJU has become synchronized with the NTR, it time to units
also transmits initial net entry messages. A unit not within beyond LOS of
LOS of the NTR can then synchronize with the network by the NTR.
synchronizing with the IEJU. Any active terminal can
perform this function, and any number of IEJUs may be
active at one time. The IEJU function can be performed by
both surface and air units and can be selected by the opera-
tor. The IEJU is also referred to as a Net Entry Control
Terminal (NECT).
Navigation Controller ■
The Navigation Controller (NC) is not a required role. An
NC is designated only when a relative grid is desired. The
The relative grid relative grid is a three-dimensional coordinate system used
is established by by JUs to report their position from the grid origin. The
the NC. relative grid origin is the origin calculated by the NC,
which includes any geodetic navigation errors made by the
NC. The NC acts as the reference unit for the grid and is
assigned a relative position quality of 15. The relative grid
becomes operational as soon as it is established by the NC.
Primary User ■
A PRU transmits All JUs, except the NTR, are said to be Primary Users (PRU)
RTTs to actively if they routinely transmit RTT messages to achieve and
maintain maintain fine synchronization with the network. Networks
synchronization designed for use by the U. S. Navy typically support up to
with the network. 200 primary users. If the number of users exceeds 200,
however, some will have to be designated as secondary
users.
Secondary User ■
A JU operating passively is said to be a Secondary User
An SU does not (SU). Units can enter the network passively, or an operator
transmit RTTs can select passive operations after entering the network
or PPLIs. actively. Two passive modes can be selected by an operator:
Synchronization
with the network ■ Long Term Transmit Inhibit
is maintained
passively. ■ Data Silent
Forwarding JU ■
A JU designated to forward data between links is called a
Forwarding JU (FJU). The FJU which translates and The FJU
forwards data between Link-11 and Link-16 is a Forwarding translates and
JU-TADIL A (FJUA). All U.S. Navy surface C2 JUs can forwards data
function as FJUAs. A unit communicating on both Link-16 between tactical
and TADIL B and which translates and forwards data links.
between them is an FJUB. U.S. Navy units do not function
as FJUBs and throughout this document the acronym FJU
should be understood to be synonymous with FJUA.
Ideally, only one FJU is assigned for the entire force, but an
alternate may be designated. The alternate FJU participates
in the Link-16 network and monitors the Link-11 net through
the C2P. Whenever it detects that the active FJU has stopped
transmitting on either link, it automatically alerts an operator
who must decide whether or not to assume the FJU function.
Section D
Net Entry
Protocol for entering the JTIDS network is handled by the Net entry is
terminal. One unit is designated to be the system time performed by the
reference. This unit is called the Net Time Reference. It JTIDS terminal.
transmits a net entry message on NPG 1 of Net 0 using the
default TSEC and MSEC cryptovariables, usually in the first
time slot of every frame. This is time slot block A-0-6.
The net entry message for JTIDS is the Initial Entry message.
The time at which this message is transmitted defines the
system time. The body of the net entry message includes the
time quality, RTT radio silence status, and the current default
net number. It may contain voice, PPLI, and RTT time slot
assignments on the default net for the next epoch. Depending
on the transmitting terminal’s AJ Communications Mode
setting, the terminal may automatically append extension or
continuation words to the message.
Coarse Synchronization ■
The first step to entering a network is to acquire synchroni-
zation. Using an estimate of the current time and an estimate
of its own clock error (time uncertainty), a terminal entering
The only the net chooses a time slot from the A-0-6 time slot block
transmission which it is certain has not yet occurred. It begins listening
made by a for a net entry message. It starts listening one time-uncer-
terminal in coarse tainty period before the expected time slot, and continues to
sync is the RTT listen for one time-uncertainty period afterwards. If the
interrogation. uncertainty estimate is correct, it should receive the message.
If the message is not received, the terminal tries again. If the
message is received, the time of receipt is used to correct the
terminal’s system time. This adjusted system time may still
include an error due to propagation time.
Once the net entry message has been received the terminal is
declared to be in coarse synchronization. After a terminal
has achieved coarse synchronization, it knows the system
time to within one slot-time and it can begin to transmit RTT
interrogations.
Fine Synchronization ■
The terminal must Once in coarse synchronization, the terminal transmits an
be in fine sync to RTT-I interrogation to the NTR. The NTR responds during
transmit messages the same time slot with a reply. This reply contains the time
on the network. of arrival of the interrogation at the NTR. Using both the
measured time of arrival of the reply, and the reported time
of arrival of the interrogation, the terminal can further adjust
its system time to remove the error due to propagation time.
The terminal is then declared to be in fine synchronization.
The terminal must be in fine synchronization to fully
participate in the network.
Section E
Location and
Identification: PPLIs
JTIDS terminals employ relative navigation techniques to
constantly fix their platform’s position. This information is
transmitted periodically, along with other identification and
status information, in the Precise Participant Location and
Identification (PPLI) message. The PPLI is the “friendly unit
reporting message.” It can be used to determine link partici-
pants and data forwarding requirements, as well as to initiate
air control. It also supports passive synchronization. PPLIs
are transmitted periodically by all JUs active on the network
on NPG 5 and/or NPG 6. PPLIs generated for Link-11 units
by the FJU are transmitted on NPG 14.
Precise Location ■
Location is reported as a three-coordinate geodetic point
having latitude, longitude, and altitude. Present course and
speed are also provided. This information is used by the
receiving terminal’s RELNAV function, along with other
information such as the quality reports, RTTs, and local
navigation inputs, to refine its calculations of its own position.
Positive Identification ■
Each participant in Link-16 is assigned a unique JTIDS Unit
(JU) number between 00001 and 77777. In addition, the In addition to
JTIDS terminals themselves require a Source Track Number identification and
(STN) of 5 octal numbers. This must be the same as the JU position, the PPLI
number in order that the terminals may perform receipt/ message reports
compliance processing. air control and
voice net
In addition to the JU number, the PPLI message contains numbers, time
information such as IFF codes, platform type, mission, quality, and
location and movement information, and link activity position qualities.
information. Not all of this information is available to Model
4 platforms, which are limited by their Link-11 and Link-4
database structure.
Status ■
Time Quality ■
Each terminal estimates how well it knows system time. This
estimate is based on its clock drift, the accuracy with which
the terminals replying to its RTT interrogations know system
time, and the time since it last completed an RTT exchange. Only the NTR
This estimate is used to set its time quality (Qt ). Values of has a time quality
time quality range from 0 to 15. Only the NTR has a time of 15.
quality of 15. Each terminal provides its time quality to the
network in every PPLI message that it transmits, as well as
in the RTT message and any Initial Entry message that it
transmits.
Position Quality ■
Position quality is a value between 0 and 15 indicating the
Geodetic position is accuracy with which a unit knows its geodetic position
measured in latitude, (Qpg ) and its relative position (Qpr ). Geodetic position is
longitude, and altitude. measured in latitude, longitude, and altitude. Position is
provided by navigation sources, and the value entered by the
system manager should be consistent with the platform’s
navigation equipment. A geodetic position quality of 15 is
assigned to stationary Position References and indicates
accuracy of position within 50 feet.
Passive Synchronization ■
The PPLI message is essential to the process of passive
synchronization. Using the position of a unit reported in the
PPLI and knowledge of its own position, a unit operating
passively can estimate the range and therefore the propagation
time required for the message. Combining this information
with the actual arrival time, and taking into consideration the
time quality and position quality reported in the PPLI, the
terminal can make adjustments to its estimate of system time.
Section F
Receipt/Compliance
Certain messages require acknowledgment to indicate that
the message was received. Two levels of acknowledgement,
called receipt/compliance (R/C) processing, are performed.
Machine receipts The first level of acknowledgement, called machine receipt
are issued by the (MR), is performed automatically by the system. The second
JTIDS terminal level of acknowledgment is a response from the operator and
as required. indicates an intention to comply (HAVCO) or not to comply
(CANTCO). In Link-11, the machine receipt portion of the
R/C processing is performed by the TDS computers. In
Link-16, it is an automatic function performed by the JTIDS
terminals. Other responses, such as can’t process
(CANTPRO), are possible as well.
Section G
Relays
JTIDS is strictly a UHF line-of-sight communications
system. For air-to-air, or ship-to-air, this is approximately
Relays are 300 nautical miles. For ship-to-ship, this is closer to
required to 25 nautical miles. Because of this, relays are almost always
extend JTIDS required for the Battle Group. Relays are established during
connectivity network design, and time slots are allocated specifically for
beyond this purpose. As many JUs as possible are preassigned as
line of sight. either conditional, unconditional, or suspended relays. Time
slots are allocated for relay as part of the network design and
can be changed only by time slot reassignment.
General Requirements ■
The network is The JU designated to be a relay must be provided with the
designed with capacity to transmit the relayed message. Messages received
specific time slots in one time slot are relayed at a later time in a specified,
designated as preallocated slot. The original message and the retransmitted
relay pairs and message are referred to as a relay pair. Paired time slot
specific JUs blocks are assigned as part of each NPG that requires relay
designated to support. The number of time slots required depends on the
perform the relay number of relay hops required to reach the destination. The
function. U.S. Navy is currently using only single-hop relays.
Paired Slots
AA AA
•• •
AA
AA AA
AA
• •
•
Relay Delay
Original Relayed
Transmission Transmission
LK-16/6-08M-032c
Figure 6-12. In the paired slot relay, the slot of the original
message is paired with a slot for the relay retransmission of the
message by specifying the original slot and a relay delay.
Figure 6-13. If the time slot block assignments are known, the relay delay can be
calculated. The delay must be between 6 and 31 time slots.
Relay Types ■
The type of paired-slot relay is specified in the message itself
and provides additional information to the terminal about the
information to be relayed. The following types are defined:
■ Main Conditional/Unconditional
■ Voice Conditional/Unconditional
■ Control Conditional/Unconditional
■ Zoom
■ Directed
■ Message Directed
■ Participation Group
■ Flood Relay
JU 3
JU 5
1st Relay
2nd Relay
3rd Relay
Original
JU 4
JU 6
AA AA AA A
1 2 JU
JU JU
7
•••
AA AA A
Original Relay Relay Relay
•••
AAAAAAAAAAAAAA
A A A A A A A AA AA A A A
1st Hop 2nd Hop 3rd Hop
AAAAAAAAAAAAAA
AAAAAAAAAAAAAA
JU 1 XMT XMT XMT XMT
AAAAAAAAAAAAAA
A A A A A A A AA AA A A A
JU 2 RCV XMT XMT XMT
AAAAAAAAAAAAAA
A A A A A A A AA AA A A A
JU 4 – RCV XMT XMT
LK-16/6-08M-032d
JU 5 – – RCV XMT
AAAAAAAAAAAAAA
A AAAAAAAAAAAAA
JU 6 – – – RCV
JU 7 – – – RCV
Figure 6-14. In the flood relay, all units receiving the original message as well as
the message originator retransmit it in all remaining relay slots.
■ Repromulgated Relay
■ Blind Relay
Section H
Communications Security
Communications security (COMSEC) is provided by the
KGV-8 Secure Data Unit (SDU) and entails several layers of
encryption.
The KGV-8 ■
The Secure Data Unit encryption device, the KGV-8,
attaches directly to the terminal and has memory locations
available for 8 cryptovariables. A cryptovariable (CV) is a
binary key used to encrypt and decrypt data. CVs are not
referred to directly but are given a label. This
cryptovariable logical label (CVLL) is a number between
0 and 127 . The Network Designer assigns a CVLL to each
time slot. CVLLs are used during network design to segment
or isolate portions of the network into cryptonets.
SDU
CPD CCPD = 0 CVLL CV
Memory Location
1st Pair 0 0 today 6 01001 . . . 11 CCPD for
July 7, 1994
1 1 tomorrow 6 01011 . . . 10 is 0.
2nd Pair 2 0 today 1 00101 . . . 01
3 1 tomorrow 1 00111 . . . 01 July 5
CV 5 CPD = 0
3rd Pair 4 0 today 23 10101 . . . 10 July 6
CV 6 CPD = 1
5 1 tomorrow 23 10001 . . . 11
July 7
4th Pair 6 0 today 2 01011 . . . 01 CV 7 CPD = 0
Figure 6-16. The SDU memory locations contain pairs of cryptovariables used to
encrypt and decrypt the message data. These CVs are assigned a label, or CVLL, used
by the Net Designer to assign the CV to each time slot. The current Crypto Period
Designator (CCPD) identifies which of the pairs to use.
Within the SDU are eight memory locations organized as four today/
tomorrow pairs. Each location is associated with a CVLL. It is also
associated with a crypto period designator (CPD). The even-numbered
locations are assigned a CPD of 0 and the odd-numbered locations are
assigned a CPD of 1. Crypto personnel load the appropriate CVs into the
appropriate SDU locations. The designation of which CVLL is loaded into
which member of the pair is not happenstance. Every day is assigned a CPD,
beginning with 0 on January 1, 1985 and alternating between 0 and 1 for
each day thereafter. The Current CPD (CCPD) is established by the date
on which the terminal is initialized. It is either a 0 or 1 and designates to
the terminal which one of the pair to use for today. The other one is
automatically used for tomorrow. An additional parameter, the sequence
number, varies between 0 and 7 and indicates how long the CVs will
be used.
May 1 0 May 0 1
Jun 0 1 Jun 1 0
Jul 0 1 Jul 1 0
Aug 1 0 Aug 0 1
Sep 0 1 Sep 1 0
Oct 0 1 Oct 1 0
Nov 1 0 Nov 0 1
Dec 1 0 Dec 0 1
Mar 0 1 Mar 1 0
Apr 1 0 Apr 0 1
May 1 0 May 0 1
Jun 0 1 Jun 1 0
Jul 0 1 Jul 1 0
Aug 1 1 Aug 0 1
Sep 0 1 Sep 1 0
LK-16/6-08M-032f
Oct 0 1 Oct 1 0
Nov 1 0 Nov 0 1
Dec 1 0 Dec 0 1
Section I
Multinetting
The JTIDS waveform allows for the definition of 127 different
nets. The net number, along with the TSEC cryptovariable and
time slot number, determines the carrier frequency hopping
pattern. These different hopping patterns are what keep the nets
separate and distinct and allow multiple nets to operate
concurrently. Multiple nets can be established simply by
specifying different net numbers for a particular NPG, without
changing the TSEC and MSEC cryptovariables. If the MSEC
and TSEC cryptovariables are changed, several variations of
multinetting are possible, including blind relays. The most
common forms of multinetting are stacked nets, and crypto nets.
Figure 6-18. The blind relay, a type of multinetting, occurs when two
JUs are assigned the same TSEC cryptovariable and the same net
number, but a different MSEC cryptovariable.
Multiple Nets ■
Multiple nets can be established simply by specifying
different net numbers. The SDU of the Class-2 terminal
holds up to 8 cryptovariables stored as today/tomorrow pairs
which could be used at any one time. Using one of these CVs
in conjunction with 127 possible net numbers allows a
potential of 508 different hopping patterns, or independent
nets for any given time slot block. Although hundreds of nets
are possible, any given terminal can transmit or receive on
only one of them for each time slot.
•
•
• Note: The time slots
Net 4 of each TSB are
Net 3 actually interleaved,
Net 2 not contiguous.
Net 1 NPG 10
Net 0 NPG 4
NPG 8
A – 8 – 10 8 0 1 1
LK-16/6-08M-032g
A – 40 – 9 4 1 1 1
A – 0 – 12 10 2 2 1
Stacked Nets ■
A stacked net is created by assigning the same group of time slots
to the same NPG with the same TSEC parameter but with different
net numbers. The time slots must have the same set, initial slot
number, and recurrence rate. They may have different net numbers
and the same crypto keys, or different net numbers and different
crypto keys. The Voice Nets and the Control Nets are examples of
stacked nets.
•
•
• Note: The 16 time slots
Net 4 of TSB A – 8 – 10 are
Net 3 actually interleaved,
Net 2 not contiguous.
Net 1
Net 0
NPG 19
A – 8 – 10 19 2 1 1 E-2C + 8 F-14Ds
LK-16/6-08M-032h
A – 8 – 10 19 3 1 1 E-2C + 4 F-14Ds
A – 8 – 10 19 4 2 1 E-3A + 8 F-15s
Figure 6-20. A stacked net is created by assigning the same time slots to the same
NPG with the same TSEC parameter, but with different net numbers.
Crypto Nets ■
Isolation between networks or between network users is
created by configuring the terminal’s cryptovariables with
different CVLLs. Only authorized users, those with the
correct TSEC and MSEC CV will be able to exchange
A group of JUs information. Crypto nets are created by assigning a different
can be isolated TSEC CVand/or MSEC CV to a group of users.
from other JUs by
assigning them a If the TSEC CV is the same and only the MSEC CV is
different MSEC different, unauthorized users can receive the signal, error
and /or TSEC CV. correct it, and retransmit it. But, they cannot decrypt it, and
this configuration of CVs is used to establish blind relays. The
net consisting of the participants with the correct MSEC is
sometimes referred to as cryptonet with CVLL = n, where n is
between 1 and 127. If the TSEC CV is different, unauthorized
users cannot even receive the signal. If both the TSEC and
MSEC are different, complete isolation is established.
Multiple Networks ■
Each network has Multiple networks have a different TSEC and a different
its own NTR. MSEC. Each network is independent of the other and has its
own NTR assigned. This complete isolation of networks
allows independent networks for each service to coexist
within the same OpArea.
Section J
Range Extension
The most common method of extending JTIDS range beyond
line of sight (BLOS) is the employment of airborne relays.
This is not always feasible, however, due to the lack of
airborne assets or conflicting mission requirements. Several
means of employing satellite communications to extend the
range of TADIL J are under development as part of the Joint
Range Extension (JRE) program. None of them have yet been
certified for interoperability nor undergone operational
evaluation. Various connectivity devices have been developed
as well to support testing and training over landlines.
■ STDL
The Satellite Tactical Data Link (STDL) was the first
implementation of satellite Link-16, and provides the means
for the Royal Navy of the United Kingdom to exchange
Link-16 tactical data using SHF satellite communications.
Three modes of operation are to be used: a network mode,
group mode, and broadcast mode. A TDMA architecture
permits participation by up to 16 transmitting Satellite Units
(SatUs) in the network mode, forwarding from an STDL
network to a Link-11 or JTIDS/Link-16 network by
Forwarding Satellite Units (FSatUs) in the group mode, and
transmission by one unit to other SatUs in the broadcast mode.
In the network mode, propagation and processing delays are
taken into consideration in order to synchronize satellite
transmissions with the SHF TDMA slot. Data rates up to an
aggregate of 19.2 Kbps are provided.
■ S-TADIL-J
Satellite TADIL J (S-TADIL-J) is a Navy design for extending
the range of Link-16 using satellites. This capability has been
demonstrated in the Model 4 C2P, and will be implemented in
both the Model 4 and Model 5 C2P. It requires no
modifications to the tactical system. The C2P operates on
both the JTIDS network and the satellite concurrently.
Transmissions on the satellite are generally delayed with
respect to the JTIDS network, and data received from the
JTIDS network is given precedence by the C2P over data
received from the satellite. When a JU drops out, as evidenced
by no PPLI reception for 60 seconds, the C2P automatically
and “seamlessly” takes data for that JU from the satellite.
■ JRE
JTIDS Range Extension (JRE) is the Army/Air Force
approach to extending Link-16 coverage across “zones” to
include multiple networks that cover an entire theater. Units
within LOS or connected by airborne relay or satellite and
employing the same network design, such as that described for
S-TADIL-J, define a zone.
S-TADIL-J
Model 4: 3Q ’98
Model 5: 1999
Joint Range
S-TADIL-J
Extension
Figure 6-21. S-TADIL-J and JRE, under development as part of the Joint Range Extension
(JRE) program, use satellite communications to extend the range of TADIL J beyond
line-of-site.
Connectivity Devices ■
Other methods of extending the JTIDS range currently in use
vary from wireline to unmanned aerial vehicles (UAVs) to
radios that employ tropospheric scattering! Several devices
have been specifically designed to provide serial connections
to “glue together” tactical systems at remote locations. These
systems employ serial interfaces and secure telephone lines.
They include:
■ ABN-16
■ MTDS
The MTDS acts as a networking device and forwarder. It
permits multiple units to share a single JTIDS terminal. The
connection is serial and implements a landline protocol known
as Serial J. The MTDS also can operate as a TADIL B
forwarder. The display shows the tactical situation and
provides throughput information on the active connections.
■ Gateway
The Link-16 Gateway is a connectivity device developed by
NRAD to provide Link-16 communications between
geographically separated facilities, enabling a greatly
expanded range of JTIDS/MIDS interoperability testing and
training. The Gateway system can be configured as a
Gateway Terminal Emulator (GTE), Gateway Host (GH)
emulator, or Gateway Monitor (GM). Gateway supports the
MIL-STD-1553b, X.25, and E-3 Boeing Serial data bus and
can be equipped with nine RS-232 interfaces. These RS-232
serial interfaces implement a proprietary protocol as well as an
open standard known as SIMPLE.
■ DTSS-16
■ LDDS-16
7
C
H
A
P
T
E
R
Link-16
Operations
Introduction
This chapter reviews the design goals of Link-16 and summarizes concepts relevant to
its operation. It illustrates some of the basic Link-16 operational concepts, primarily by
comparison with current Link-11 and Link-4A, and by describing the differences
between these other two tactical data links. For detailed Link-16 Standard Operating
Procedures, refer to the OPNAVINST C3120.43 series.
7-1
Section A
Design Goals
Link-16 was designed, and has been implemented in the
U. S. Navy, to satisfy particular goals. These include:
■ Autonomous operation
■ Maximum automation
■ Standardization
■ Backward implementation
Maximum Automation ■
The Link-16 message standard, particularly the protocols for
data exchange, are designed to support maximum automa-
tion of tactical functions, such as engagement tactics and
combat decisions. This concept enables a system to be
designed such that operator burden can actually be reduced
over that required for operating on current Link-11. The
digital hand-over process is a good example of the concept
of maximum automation.
Standardization ■
A general policy of maximum standardization is reflected in
the Link-16 message standard in two important ways. First,
data element definition and employment is standardized to
the maximum feasible extent across the various warfare
areas (AAW, ASW, etc.). Second, Naval implementation of
all data items is standardized to the maximum appropriate
extent among all platforms. Such standardized implementa-
tion is intended to:
Backward Implementation ■
Systems which implement a Link-16 capability that is
equivalent to a Link-11 capability not currently implemented
will implement the Link-11 and Link-16 capabilities
simultaneously. Furthermore, some of the Link-16
capabilities that were not previously available in the Link-11
message standard are now, where feasible, being added to
Link-11. This concept clearly promotes multilink
interoperability, as well as cost-efficient system design.
AUTONOMOUS OPERATION
Ideally, no voice
MAXIMUM AUTOMATION
Ideally, hands-off operation
STANDARDIZATION
All ships and E-2C virtually identical
BACKWARD IMPLEMENTATION
Update Link-11 as Link-16 is implemented
Figure 7-1. Several concepts underlie the design of Link-16 and its
implementation in the U. S. Navy.
Section B
Platform Identification,
Position, and Status
The installation of JTIDS/Link-16 in a wide variety of U. S.
and Allied platforms, many of which have no current tactical
data link capability, provides a greatly improved friendly
force location, identification, and status reporting capability.
The JTIDS terminals employ RELNAV techniques to
constantly fix their host platform’s position. The terminals
automatically transmit detailed positional and identification
data on Link-16 in PPLI messages at frequent intervals.
Section C
Surveillance
Surveillance consists of searching for, detecting,
identifying, and tracking objects which have tactical
significance to the Battle Group. These objects, which are
assigned a unique track number, include land points,
bearings, and fixes, as well as air, surface, and subsurface
contacts acquired from radar, IFF, sonar, and other sensors.
Automatic procedures exist to limit the reporting of a contact
to a single unit. This unit is said to have reporting
responsibility (R2) for the track. This minimizes the volume
of tracks reported, while allowing each unit to track all
contacts.
Track Reporting ■
The concept of track reporting on Link-16 is identical to that
of Link-11, with the new addition of land tracks. JUs
originate tracks and assume reporting responsibility (R2) for
Air, Surface, Subsurface, and Land Tracks using exactly the
same rules as current Link-11. Furthermore, in a multilink
force with both JUs and PUs, which communicate with each
other through a Forwarding JTIDS Unit (FJU), track
reporting is homogeneous within the entire force. Only one
Interface Unit (IU), either a PU or a JU, will have R2 for a
track at any given time.
Electronic Warfare ■
Link-16 is designed to support the concepts of cooperative
electronic warfare (EW) and data fusion. EW data is of two types:
parametric and product. Parametric data is the raw, unevaluated
EW intercepts and parameters received from systems such as the
SLQ-32 or LAMPS. These include data on fixes, areas of
probability (AOPs), and lines of bearing (LOBs). Product data is
evaluated data and normally means that an EW coordinator or
other qualified operator has evaluated the intercepts from one or
more participants and has developed a product which is deemed to
be of general tactical significance. Two different Network
Participation Groups (NPGs) support the exchange of EW data:
the EW NPG and the Surveillance NPG.
EW NPG
Parametrics
■ Fix, AOP, or LOB
Surveillance NPG
■ Frequency Product
■ Pulse Width ■ Track Number
■ more ■ more
LK16/7-08M-065
Orders
Regular AC001
(Defined by One-Point)
AC002
Multi-sided
02134 (Multiple Points)
Corridor (2 Lines)
Rectangle OP Area
(or Square)
12437
AE123
LK16/8-08M-066
Figure 7-3. The implementation of lines and areas allow JUs to share a
complete picture of the tactical theater of operations, including
geographic boundaries, operating areas, transit lanes, and other
geometric descriptions.
Data Filters ■
Data Filters may be employed to inhibit selected tracks from
transmission, to exclude them from track stores upon reception,
and to inhibit them from being forwarded. Filters may be required
to prevent the disclosure of protected data, or to prevent the
overload of an individual unit’s database, of the data link itself, or
even of the operator. Normally, filters are assigned either by
OPORDER, or in the OPTASK LINK before the link is initialized.
In view of both the high track density anticipated for modern and
future warfare and of the great numbers of JUs expected to
participate, a versatile filtering capability is a prerequisite for
participating in Link-16 operations.
Section D
Force Training
Link-16 fully supports the concept of “train the way you
fight.” Unlike Link-11, it has been specifically designed to
facilitate data link training and the use of data links in
exercises. Associated with all Link-16 track and EW product
messages are two special indicators: the Exercise Indicator
and the Simulation Indicator.
Exercise Tracks ■
The Exercise indicator signifies that a track is actually a
Friend acting as the link-reported Identity for the purpose of
the exercise. Friendly aircraft, ships, submarines, or emitters
providing opposition in exercises can be identified thereby
as Exercise Hostile (Faker), Exercise Suspect (Joker),
Exercise Assumed Friend, Exercise Unknown, or Exercise
Neutral. All other data normally reported for tracks, such as
Platform, Activity, and Specific Type, can also be reported
artificially for exercise tracks. Thus, an actually friendly
track can be fully identified, just as though it were a genuine
enemy track.
Simulated Tracks ■
Both Link-16 and Link-11 enable full training scenarios to
be conducted. Simulated tracks, based on simulated video,
are initiated with or without the presence of actual live
tracks. Both links allow the simulated video to be distributed
to all ships in a Battle Group. The Simulation Indicator
specifically identifies link tracks as simulated, not live. This
capability should also prove quite valuable during link
testing.
Section E
Air Control
Because only Link-4A will be implemented on many aircraft
and ships for several years after Link-16 IOC, Link-4A will
be retained after Link-16 becomes operational. However,
Link-16 will be used to control any JTIDS-equipped aircraft,
whether or not it is also equipped for Link-4A. A single
controlling unit can simultaneously control some aircraft on
Link-16 while controlling other aircraft on Link-4A.
Current Design ■
As currently planned, the Link-16 concept of air control
merely combines and expands the existing Link-4A air
control and the Link-11 air weapons coordination
capabilities. The J12 series of messages provides the same
mission assignment, vector discrete, uplink and downlink
target reporting, and control transfer capabilities as Link-4A,
although in each case the Link-4A capabilities are expanded
somewhat in Link-16. The Link-16 C2 to C2 capabilities for
digital handover requests, controlling unit (CU) reports,
engagement status reports, and pairing reports are virtually
identical to those of Link-11.
Section F
Special Functions
Special functions, such as the transfer of video imagery, may be implemented in
the future. The quality of an image depends on four factors: the size of the image,
whether it is color or gray-scale, the compression ratio, and the parameters of
the time slot assignment. These time slot parameters will specify whether parity is
employed, whether the data is unencoded or encoded, what the packing structure is,
and how many slots are assigned to the transmitting unit.
The standard commonly employed for images is known as JPEG — Joint Photo-
graphic Experts Group. This standard, which typically achieves a compression ratio
of 25:1, works with either color or gray-scale. Full color requires 16 bits per
pixel; gray-scale requires 8. As an example of the calculation methodology, consider
a single gray-scale image that is 640 x 480 pixels. How many time slots would be
required to send this image? Calculate the amount of binary data (640 x 480 x 8 =
2,457,600 bits) and divide by the compression ratio (2,457,600 ÷ 25 = 98,304 bits).
If the data is sent encoded, without parity, with a P2DP packing structure, 450 bits
per time slot are available. This requires just over 218 time slots. There are 128 time
slots per second. If 96 of them were assigned to a single unit as an imagery backlink,
for example, it would take about 2 1/4 seconds to transfer the entire image.
The international standard employed for video is known as MPEG — Motion Picture
Equipment Group. MPEG uses an interframe method, which compresses the differ-
ences between frames. This method has a typical compression ratio of 150:1. To
estimate how many frames per second (fps) JTIDS could support, assume that the
data is sent R-S encoded, without parity, with a P4 packing structure. This allows
900 bits per time slot. Allocation of 768 time slots per JTIDS 12-second frame
would support a data rate of 57.6 kbps. With a 150:1 compression ratio, this is 3.5
fps for a 640 x 480 gray-scale image and 16.5 fps for a 256 x 256 gray-scale image.
Section G
Network Management
The Area Air Defense Commander (AADC) is responsible for
monitoring force composition and geometry and for maintain-
ing proper network configuration. Ship COs and aircraft
Mission Commanders, under the AADC’s direction, may
modify operating parameters appropriate to mission changes.
The AADC designates an Interface Control Officer (ICO) to
maintain successful, continuous data exchange on the operat-
ing Link-16 network. The ICO function may be assigned to
any surface C2 JU. The ICO may designate a TADIL J
Manager to manage Link-16 for him in complex multilink
networks. The ICO is referred to as the Joint ICO (JICO) in a
U. S. Joint interface not including Allied units.
LMS-16 ■
The LMS-16 acquires Link-16 data via the MIL-STD-1553
data bus from an instrumented JTIDS receiver. It provides
both signal and tactical information about the performance of
the multi-TADIL network.
The LMS-16 With this information, the ICO can proactively manage the
provides multi-TADIL network to ensure reliable and complete connec-
information the tivity among all participants. Supported by the hardcopy and
ICO needs to replay capabilities of the LMS-16, the ICO can make presenta-
manage the tions on network performance at hot washes and debriefings.
Link-16 network.
A special version of the LMS-16 software is available that
permits the LMS-16 to connect to a Navy Class 2 JTIDS
terminal as either a host or as a bus monitor.
Appendix A
Multilink Operations
This appendix describes the simultaneous operation of Link-11 with Link-16. It focuses
on the methods by which units operating on Link-11 and units operating on Link-16 will
interoperate across both links while maintaining a common, cohesive tactical picture.
Such a multilink community is truly an integrated, single, united data link community,
sharing a common tactical picture. In fact, in any operational unit which has both
Link-11 and Link-16, the link or links on which the unit is operating should be transparent
to most operators.
A-1
Section A
Data Forwarding
Data forwarding is the process of receiving data on one
digital data link and outputting the data onto another digital
data link in the proper format. In the process, messages
received on one link are translated to appropriate messages
on the other. Applicable data fields within the messages are
translated to the appropriate data fields in the corresponding
messages. There is not always a one-to-one correspondence
between messages; for example, multiple messages on one
link sometimes translate into a single message on another
link. All Link-11 data can be translated and forwarded to
Link-16; however, approximately half of the data originated
on Link-16 either cannot be forwarded to Link-11 or will be
degraded (lose specificity) in translation.
The Forwarding JU ■
A unit which performs the data forwarding function for a multilink
force is referred to as a Forwarding JTIDS Unit (FJU). Any ship
with a Command and Control Processor (C2P) can
perform the data forwarding function. In fact, the C2P is the only
U. S. Navy system capable of performing the FJU function. The
C2P will be installed in all shipboard platforms.
JU JU
FJU
PU
ork
e tw
1N
k-1 Link-16 Network
Lin
Net 3
PU Net 2
PU Net 1
Net 0
JU
LK16/A-08M-
067
Figure A-1. The U. S. Navy FJU forwards data between the Link-11 PUs
and the Link-16 JUs, in both directions. It is a participant on both links.
Multiple FJUs ■
Generally, only one unit should be assigned the role of FJU
between any two links to prevent the possibility of data
being transmitted over redundant paths. Having mentioned
this, however, we now discuss two situations in which more
than one FJU is needed. Multiple FJUs are needed when
PU 02
PU 04
PU 01 PU 03
JU 01
FJU 1
JTIDS Network 1
JU 10
HF Link-11 No. 1
JU 03 JU 02
PU 05
JU 13 JU 11
JU 05
FJU 2
PU 33
HF Link-11 No. 3
JTIDS Network 2
PU 20
JU 25
JU 20
FJU 5 PU 12
JU 12
FJU 3
JTIDS Network 3
HF Link-11 No. 2
PU 17
JU 17
FJU 4 LK16/A-08M-068
Figure A-2. When an airborne relay is not available, multiple FJUs operating on HF Link-11
can connect two or more Battle Groups that are out of UHF range.
U.S. Navy FJUs Since the U. S. Navy’s FJUs cannot forward to or from
cannot forward TADIL-B units, it will normally be necessary to assign some
for TADIL B. combination of other services’ FJUBs and FPUs to forward
messages between their TADIL B Reporting Units (RUs),
Link-16, and Link-11. When these links are operating
together, the necessity of assigning multiple forwarding units
can be avoided only when a non-naval unit is available that
can forward messages for all three links. Such a unit is
known as a FJUAB.
RU
AAAA AAA
AAAAAAAAA
RU
AA
AA
AAA
AAAAAAA
JU
AAAA
AAAA AA
AA AAA
AAA
JU
AAAAA
AA JU
AA
JU
AA
JU
AA AAA
AA
AA
AAAA AAA AA
AAA
AA AAAAAA AAAA
AAA AA
AAAA
AAAA
AAAAAAAAA
AAAAA
AAAAAAAAA AAA
AAA AAAAAA
AAA AA AAA
AAAA AAA
AAA
AA
AAAA
FJUAB
AAA
AA
AAAA
AA AAA AAAA
AAAAAA
AAA
AAA AAAA
JU JU
FJUA PU
AAAAAAA
AAAA
AAA A AAAAA AA AA
PU
AA
AA AAA AA
AA AA
AA
AA
AA
AA AA AA AA
AAA
AAA AA
AAA
AA AAAA
AAAAA AAAAA
AAA
AAAAAA AAA
AAA AAAAA AAAA
AAA PU
LK16/A-08M-
PU
AAAAAAAAAAAA AAAAAAA
AAAA
PU
069
PU
Figure A-3. Multiple FJUs may be necessary to forward data between Link-16, Link-11, and
TADIL B...unless an FJUAB from another service is available.
Section B
Concurrent Operations
If perfect connectivity could be maintained at all times
between all units of a multilink force, and if the FJUs could
always remain fully operational, there would be no need for units
to operate on more than one link at a time. In this ideal world,
Link-16 and multilink-capable units would operate only on
Link-16, and units having only Link-11 would maintain
interoperability through an FJU. Only the FJU would need to
operate on both Link-11 and Link-16.
Normal OPS
JU
Link-16 Network
Net 3
Net 2
Net 1 FJU PU
Net 0
JU
LK16/A-08M-071a
CIU
CIU
Link-11 FJU Link-16
CIU
LK16/A-08M-070
Figure A-5. FJUs and CIUs operate on both links simultaneously. The
existence of one or more CIUs can greatly expedite the transfer of the
FJU function.
The following rules ensure that only the direct path is followed:
Concurrent OPS
CIU
Link-11 Network
Net 3
Net 2 FJU PU
Net 1
Net 0
(Does not forward CIU data)
JU
LK16/A-08M-071
Figure A-6. CIUs transmit and receive all data directly, rather than through
a data forwarder.
Concurrent Operations
Advantages Disadvantages
■ Expedites FJU shifts ■ Slightly increases Link-11
overhead
■ Increases unit availability
■ Brief data loss when CIU
■ Enhances data specificity loses one link
Section C
Multilink Functions
The message standards of both Link-11 and Link-16 include
numerous protocols for conducting various tactical functions
over a data link. The primary functions which are performed
over a tactical data link include:
■ Low TN Block
The Low TN block is limited to TNs less than 07777, which
by definition includes all Link-11 TNs. Low TNs are used
for originating tracks on Link-11, with the leading zero
removed, as well as on Link-16.
■ High TN Block
The High TN block includes all TNs greater than 07777. It
consists of the numeric TNs 10000 - 77777 and the alphanu-
meric TNs 0A000 - ZZ777. These TNs are used only to
originate tracks on Link-16. They will normally be allocated Only the FJU will
only for “overflow” purposes; that is, they will be used only see both low and
when all allocated Low TNs are in use. Furthermore, during high TNs.
the early years of Link-16 operations, it is anticipated that
every effort will be made to avoid allocating these High TNs
at all, to simplify interoperability between PUs and JUs.
Low TN High TN DF TN
Value 07777 or less 10000-77777 07777 or less
0A000-ZZ777
LK16/A-08M-074
3
Air Track TN = AB02
Air Track TN = 7001
PU FJU AB023 = 7001 JU
LK16/A-08M-072
Figure A-9. The FJU uses its DF TN block to forward tracks with Link-16 High TNs to
Link-11. The FJU reports this associated “CTN” to Link-16 for use in voice coordination.
When a given When the Link-16 TN is greater than 07777, however, the
track is assigned FJU associates a new TN with it for use on Link-11. This
different TNs on process is called TN association. The FJU must insert the
Link-11 and Link-16 TN into all subsequent messages concerning this
Link-16, the track when they are forwarded from Link-11, and insert the
Link-11 TN will Link-11 TN into all messages when they are forwarded from
be used as the Link-16. The TN for Link-11 is taken from the block of DF
CTN in all voice TNs assigned to the FJU specifically for TN association. At
communications. the same time, the FJU generates a message informing all
Link-16 JUs of the associated Link-11 TN. This Link-11 TN
will be used as the CTN in all voice communications. In the
future, all PUs may be able to receive and display the High
TNs, and then the Link-16 TN will become the CTN.
Resolving Information
Differences ■
Resolving information differences ensures that all units of
a multilink force hold the same Environment/Category and
Identity for any given track. To achieve this objective, the
protocols of the two links for resolving information
differences are virtually identical.
Weapons Coordination ■
All engagement status reports will be forwarded by the FJU.
Thus, all units of a multilink force will have a common pool
of knowledge upon which to base engagement decisions and
resource allocation. All Command orders will also be for-
warded, even if the addressee is on the same link as the origi-
nator of the Command. This redundancy ensures that the
Composite Warfare Commander (CWC) and all warfare area
commanders are aware of all orders that have been issued.
Aircraft Control ■
All reports which identify the controlling unit of controlled
aircraft will be forwarded by the FJU. Requests for handover
of aircraft control will be forwarded whenever the addressee
is on a link other than the one on which the originator of the
request is operating.
Electronic Warfare ■
All Link-11 electronic warfare (EW) data is always forwarded
to Link-16, but not all Link-16 EW data is forwarded to
Link-11. The problem of possibly saturating Link-11 with
detailed parametric EW data has been recognized for a long
time. Because of its comparatively slow data rate, Link-11 is
not used for EW data exchange to any great extent. The
J-series message standard allows reporting considerably
more EW data on Link-16 than can be reported on Link-11.
Because of the potential for overloading Link-11 by
forwarding to it all Link-16 EW data, all FJUs are capable of
operating in either of two EW data forwarding modes:
■ Product Mode
■ All Mode.
This appendix contains a list of all Joint and Allied Link-16 Platforms. Names and hull
numbers are provided for United States Navy units expected to become Link-16 capable.
In this appendix, units designated with an asterisk (*) are NonC2 JUs. Others are C2 JUs.
Army
NC3 and NC2 Operations C2 Centers
NC1 SAM and SHORAD Control Stations
Various other command posts and control stations
Navy
Aircraft Carrier (CVN) Charles De Gaulle
Cassard-Class AAW Frigates
New Generation (or “Project Horizon”) AAW Frigates
E-2C AEW Aircraft
*“Rafale” Fighter/Attack Aircraft
Germany
Air Force
*EF-2000 European Fighter Aircraft (EFA)
Italy
Air Force
Air Command and Control System (ACCS) Sites
MRCS 403 Mobile Control and Reporting Center
*Tornado Air Defense Aircraft
*Tornado Fighter Bomber Aircraft
*AMX Multipurpose Aircraft
*EF-2000 European Fighter Aircraft
*“Rafale” Fighter/Attack Aircraft
Army
*Air Defense Artillery Sites
Navy
Cruiser Garibaldi
Maestrale-Class Frigates
*EF-101 and NFH-90 Helicopters
NATO
E-3 AEW Aircraft
Spain
Air Force
Air Command and Control System (ACCS) Sites
*F/A-18 Hornet Fighter Aircraft
*EF-2000 European Fighter Aircraft
Navy
CVSG Aircraft Carriers
Type 42 AAW Destroyers
*Sea Harrier (SHAR) Aircraft
United States
Air Force
Modular Control Element (MCE)
E-3 Sentry Airborne Warning and Control System (AWACS)
Aircraft
E-8 Joint Surveillance Target Attack Radar System (JSTARS)
Aircraft
Airborne Command, Control, and Communications (ABCCC)
Aircraft
Mobile Air Operations Center (MAOC)
*F-15 Eagle Fighter Aircraft
Army
Forward Area Air Defense (FAAD) System
Patriot, Theater High Altitude Area Defense (THAAD)
Joint Tactical Ground Systems (JTAGS)
Corps Surface-to-Air Missile (Corps SAM)
Army Theater Missile Defense Tactical Operations Center
(AMTD TOC)
Marine Corps
Tactical Air Operations Module (TAOM)
Advanced Tactical Air Control Center (ATACC)
*F/A-18 Hornet Fighter Aircraft
Navy
Aircraft Carriers
California-Class Cruisers
Ticonderoga-Class Cruisers (beginning with CG-52)
Kidd-Class Destroyers
Arleigh Burke-Class Destroyers
Wasp-Class Amphibious Assault Ships
E-2C AAW Aircraft
*F-14 Tomcat Fighter Aircraft
*F/A-18 Hornet Fighter Aircraft (MIDS)
Hull Hull
USS USS
Number Number
Appendix C
Acronyms and Abbreviations
EA Electronic Attack
ECA Electronic Cabinet Assembly
EDAC Error Detection and Correction
EHF Extremely High Frequency
EHSP Enhanced High-Speed Processor
EMCON Emissions Control
EMDU Enhanced Main Display Unit
ES Electronic Surveillance
ETA Estimated Time of Arrival
P2 Packed 2
P2DP Packed-2, Double Pulse
P2SP Packed-2, Single Pulse
P4 Packed 4
P4SP Packed-4, Single Pulse
PIU Power Interface Unit
PN Pseudorandom Noise
PPLI Precise Participant Location and Identification
PR Position Reference
PRI AMP Primary Amplification
PRU Primary User
PTB Plain Text Bus
R2 Reporting Responsibility
RAF Royal Air Force (British)
R/C Receipt/Compliance
RDF Radio Direction Finding
RELNAV Relative Navigation
RF Radio Frequency
RHIU Remote Host Interface Unit
RIO Radar Intercept Officer
RN Royal Navy (British)
RR Recurrence Rate
RRN Recurrence Rate Number
R-S Reed-Solomon
R/T Receiver/Transmitter
RTT Round Trip Timing
RTT-A Round Trip Timing – Addressed
RTT-B Round Trip Timing – Broadcast
RTT-I Round Trip Timing – Interrogation
RTT-R Round Trip Timing – Reply
RTIU Remote Terminal Interface Unit
RU Reporting Unit
W watts
WCM Weapons Coordination and Management
WCS Weapons Control System
WILCO Will Comply
WRA Weapons Replaceable Assembly
XOR Exclusive Or
Appendix D
Glossary
The following terms have been used or defined in this guidebook. Terms in italics are
cross-references.
Access rate The assigned rate that determines the frequency of a JTIDS
terminal’s contention access to an assigned time-slot block.
Air Control The Network Participation Group (NPG 9) that provides the
means for command and control (C2) JTIDS units (JUs) to
control nonC2 JUs.
Bit A binary digit. A bit has only two possible values: zero
and one.
Blind relay A relay in which a JTIDS relaying unit is initialized with the
correct transmission security (TSEC) cryptovariable for
receiving and retransmitting messages, but is initialized with
a different message security (MSEC) cryptovariable, which
prevents it from being able to decrypt the messages it relays.
Common Track The track number held by all interface units for a contact and
Number (CTN) used in voice and other communications to identify it.
Conditional relay A relay mode in which JTIDS units (JUs) selectively activate
or deactivate their relay function based on which JU can
provide most efficient coverage.
Contention access The assignment of time slots to a group of units unit for
transmission purposes, such that any or all of the units may
be transmitting simultaneously during the assigned time
slots.
Cryptovariable (CV) A binary key used by the JTIDS terminal to encrypt and
decrypt data or transmissions. Cryptovariables are assigned
during network design and are loaded into the Secure Data
Unit during terminal initialization.
Cyclic code shift A method of encoding and decoding data using a class of
keying codes that are particularly effective in detecting and
correcting multiple errors. In JTIDS, cyclic code shift
keying is applied to a five-bit symbol to produce a 32-bit
chipping sequence by shifting leftward the bits of a 32-bit
starting sequence number by a number of places that
corresponds to the numerical value of the symbol.
Dedicated access The assignment of time slots to a uniquely identified unit for
transmission purposes, such that only that unit transmits
during the assigned time slots.
Donated time slot A time slot, assigned to a particular JTIDS unit, that the unit
temporarily donates to the receiver of a message that
requires an automatic acknowledgement, and during which
the receiving JTIDS unit transmits its required response.
Effective Earth Radius A modification to the radius of the earth that allows the
propagation path of radio waves uniformly bent by the
atmosphere to be treated as though it were straight-line
propagation. The ratio of the effective earth radius to the
true earth radius is denoted by K and can range between 0.6
and 5.0. Its average value in temperate climates is
approximately 1.33.
Forwarding JTIDS A network role assigned to a JTIDS unit that will forward
Unit (FJU) data between tactical data links during a multilink operation.
An FJU that translates and forwards data between Link-16
and Link-11 (TADIL A) is referred to as an FJUA, and one
that translates and forwards data between Link-16 and
TADIL B is referred to as an FJUB.
Free text A type of Link-16 message structure that uses all bits for
data. Free text messages are used for Link-16 voice
communications.
Global Memory An area in the JTIDS terminal’s memory that is reserved for
the sharing and exchange of information among the multiple
processors within the terminal.
Initial Entry JTIDS A JTIDS unit (JU) that transmits Initial Entry messages for
Unit (IEJU) the purpose of assisting other units in achieving
synchronization with, and entry into, a Link-16 network.
Jitter The first portion of the time slot, during which the
transmitter is silent. Jitter may be either applied or not
applied within a time slot and when applied, it may be of
varying duration. Its purpose is to render the actual start time
of the data transmission impossible to predict.
Joint Tactical (1) The method, hardware, and software by which tactical
Information information is disseminated over Link-16. (2) Commonly,
Distribution System the JTIDS terminal, which modulates, transmits, receives,
(JTIDS) and demodulates messages for a participant in a Link-16
network.
J-series message The fixed format messages, containing tactical data and
commands, that are used to exchange information over
Link-16. These messages adhere to the standards defined
in OS 516.1.
Line of Sight The direct line in which radio waves travel, without bending
over mountains or the curve of the earth.
Long-Term Transmit A setting on the JTIDS terminal which inhibits all radio
Inhibit (LTTI) transmissions including voice and TACAN as well as data.
Low TN Block The block of assignable Link-16 track numbers that range
from 0 to 07776. The track numbers in this block correspond
to all Link-11 assignable track numbers.
Message formats For a given tactical data link, the set of sequences of fields,
composed of prescribed numbers of bits, that may be encoded
into prescribed patterns to convey specific information. The
message formats of Link-4A/C are classified.
Nautical Mile A unit of distance used in air and sea navigation based on the
length of a minute of arc of a great circle of the earth. The
unit used by the U.S. is equal to 6076.115 feet, or approxi-
mately 1.15 statute miles.
Net Entry Control A network role that propagates the system time to units
Terminal (NECT) beyond line of sight of the Network Time Reference.
Network Interface A software program, residing within the JTIDS terminal, that
Control Program has overall responsibility for communications with the
(NICP) JTIDS RF network.
OPTASK LINK That portion of the Operation Tasking Order that applies to
tactical data link communications involving ships.
Packing structure The grouping of Link-16 message words, of any format, into a
Link-16 transmission. These groups can contain 3 words,
6 words, or 12 words.
Paired slot relay A type of relay in which the time slot of the original
transmission is paired with a second time slot after a
specified delay for the retransmission of the message by the
relaying unit.
Parametric data For electronic warfare (EW), the unprocessed data that is
collected by sensors and includes lines of bearing, pulse
width, pulse repetition frequency, antenna scan period, etc.
A Network Participation Group (NPG 10) is reserved for the
transmission of this parametric data before it is evaluated by
a tactical data system.
Position Quality A value between 0 and 15 that indicates the accuracy with
which a JTIDS units fixes its own position. Two position
qualities are maintained: the geodetic position quality and
the relative position quality. When the geodetic grid is
operational, the maximum value is assigned to JTIDS units
acting as Position References. When the relative grid is
operational, the maximum value is assigned to the JTIDS
unit acting as Navigation Controller. The maximum value,
15, indicates a positional accuracy of within 50 feet.
Primary User A network role assigned to every JTIDS unit that is actively
(PRU) maintaining synchronization with its Link-16 network. The
Network Time Reference, as the unit which establishes the
timing of the network, does not need to maintain synchroni-
zation and is therefore not considered a primary user.
Propagation The fifth and final portion of the time slot, during which no
pulses are transmitted and the signal is allowed to propagate.
Pseudorandom noise A 32-bit sequence that, when exclusively OR’d bitwise with
a 32-bit chipping sequence, produces another 32-chip
sequence, the transmission symbol. The 32-chip pseudoran-
dom noise sequence, which is determined by the transmission
security (TSEC) cryptovariable, changes continuously.
Radio horizon The distance to the horizon as defined by the slightly curved
path followed by a radio wave. This distance can be
determined from the effective earth radius.
Relay delay A fixed offset, of from 7 to 30 time slots, between the time
slot during which a message is originally transmitted and the
time slot during which it is retransmitted by a relaying
JTIDS unit.
Secondary User A network role taken by any JTIDS unit that enters a
(SU) Link-16 network under restricted conditions during which
they remain either radio silent or data silent.
Symbol The intermixing of the symbols that constitute the header and
interleaving data of the message. Its purpose is to render the positions of
elements of the message header unpredictable, thus greatly
decreasing the possibility that the message transmission can
be intercepted, exploited, or jammed.
Terminal Input Messages that transfer data from a host computer, which
Messages (TIMs) aboard ships is a Command and Control Processor (C2P) and
aboard aircraft is a mission computer, to the JTIDS terminal
over the MIL-STD-1553B multiplex data bus.
Time Quality The measure, kept by every JTIDS unit, of its accuracy with
respect to a designated Net Time Reference. Time Quality
(Qt ) is expressed as an integer from 0 to 15 that represents
the number of nanoseconds’ deviation about the standard
reference. The maximum Qt value is 15, which represents a
deviation less than or equal to 50 nanoseconds.
Time refinement The third portion of the time slot, during which four
double-pulse starting sequence number (S0) symbols are
transmitted over 104 microseconds.
Time slice For the JTIDS TDMA architecture, the designation for a
single time slot that occurs during the identical period of
time for all 128 stacked nets.
Time slot The allocated period of time during which a netted unit
contributes its information over a tactical data link. Also, the
period of shortest duration of which the JTIDS TDMA
architecture is structured. The time slot is the basic window
of access to the network and is the period during which a
JTIDS unit is either transmitting or receiving.
Time slot duty A restriction that limits the usage of time slots to a number
factor (TSDF) of pulses per unit of time.
Time slot reuse The practice of assigning two or more JTIDS units to
transmit on the same net during the same time slot.
Today/tomorrow A schedule for the use of cryptovariable pairs loaded into the
pair Secure Data Unit that allows the network to rollover
cryptovariables from one day to the next without disruption
to the link.
Track number The process of assigning, and consistently using, a low track
association number for tracks which were originated on Link-16 with a
high track number and are forwarded to Link-11.
Voice A, Voice B The two channels, Network Participation Groups 12 and 13,
respectively, that are used by JTIDS units for secure
digitized voice transmissions.
Appendix E
Index
A
Access Modes 6-19
Contention 6-21 ff.
Dedicated 6-19
Time slot reallocation 6-24
Access Rate 6-23
Address
JU 1-19
PU 1-7
Air Control 7-14, 6-8 ff.
Backlink 6-8 ff.
Future enhancements 7-15
Handovers 7-15
Multilink A-20
Stacked net 1-17 (fig.)
Uplink 6-8 ff.
Antennas
E-2C 3-18
F-14D 3-28
Reception 2-33
Shipboard 2-32
Antijam
E-2C antenna 3-18
Margin 5-30, 5-43, 5-51
Architecture
Command-and-response 1-7
Link-11 1-6
Link-16 1-14 ff., 5-2, 5-17
Link-4A 1-7
Netted 1-6
TDMA 5-2 ff., 5-21
Areas 1-22, 7-10
B
Backlink. See Air Control
Battery Assembly 2-28
BIT
Initiation 2-30
Terminal function 2-18
Blind Relay 6-52, 6-58
Broadcast 3-4
C
C2 Unit 3-2, 6-18
C2P 2-11ff.
Data forwarding 4-8, 6-33, App A
Major functions 2-12 (fig.)
Message conversion 4-8
Operator entries 2-13
Version 0 2-3
Version 1 2-7
Chipping sequence 5-38 ff., 5-42 (fig.)
Class-1 Terminal 1-4
Class-2 Terminal 1-4. See also JTIDS Terminal
Coarse Synchronization. See Synchronization
Combat Override of IPF 5-66
Common Carrier Messages 4-11
Common Track Number A-17
Common variable mode 6-57
Communication Modes 5-52
Concurrent Interface Unit A-12
Concurrent Operations A-10 ff.
Contention Access 6-21 ff.
Continuous Phase Shift Modulation 2-25, 5-41
Control Panels
Indicator 2-30
Keyer 2-31
Stand-alone 4-32
Crypto Nets 6-62
Crypto Period Designator 6-55, 6-56 (fig.)
Cryptovariable Logical Label 6-54 ff.
Cryptovariables 1-15, 2-31, 5-40, 6-54 ff.
Common 6-57
Default 6-57
Partitioned 6-57
Current Crypto Period Designator 6-55
Cyclic Code Shift Keying 5-38 ff.
D
Data
Filters A-9
Flow 2-35 ff.
Forwarding A-2 ff.
Granularity 1-22
Normalized 4-4
Packing options 5-45
Update request A-19
Data Link Reference Point 1-24
Data Rates
Comparison 1-11 (fig.)
Serial 5-27
Data Silent 6-11, 6-32, 6-49
Data Storage Unit 3-28
Data Transfer Blocks 4-2, 4-20 ff.
Navigation data 4-25
Received message 4-23
Status 4-24
Transmitted message 4-23
Dedicated Access 6-19
Demodulation
Data flow 2-37
Digital Data Processor 2-23
Digital Data Processor Group 2-22, 2-24 (fig.)
Distance Measuring Equipment 5-53, 5-56, 5-60
Double Pulse 5-43, 5-49 (fig.)
Header 5-45
Synchronization 5-44
Time refinement 5-44
E
E-2C 3-10 ff.
Antennas 3-18
Broadcast 3-4
Crew 3-12
Description 3-2, 3-3 (fig.), 3-10, 3-12
Displays and controls 3-15 (fig.), 3-16 (fig.)
Equipment configuration 3-12, 3-13 (fig.), 3-14 (fig.)
Mission 3-10
Mission computer 3-14
TACAN 3-17
Terminal initialization 3-18
Electronic Cabinet Assembly 2-21
Electronic Warfare 1-2, 6-11, 7-7
Multilink A-21
Parametrics 7-7
Products 7-7
Encryption 2-25, 4-26
Epoch 5-3
Error Detection and Correction 5-25, 5-39
Exercise Indicator 7-12
Exercise Override of IPF 5-66
Extended Range 5-21
Effect on time slot structure 5-51
F
FAA 5-58
F-14D 3-19 ff.
Antennas 3-28
Crew 3-20
Description 3-2, 3-3 (fig.), 3-19, 3-20
Displays and controls 3-24, 3-25 (fig.), 3-26 (fig.)
Equipment configuration 3-21 (fig.), 3-22 (fig.)
Mission 3-19
Mission computer 3-23
TACAN 3-23
Terminal initialization 3-28
Fighter Advisory 6-13
Fighter-to-Fighter 6-13
Filters 4-16, 7-11, A-9
Fine Synchronization. See Synchronization
Fixed-Format Messages 5-23 ff, 5-24 (fig.)
Flood Relay 6-50, 6-51 (fig.)
Force Training 7-12 ff.
Forwarding
Alternate FJU A-4
C2P A-3
Filters A-9
FJU A-3
FJUA 6-33
FJUB 6-33
for Distance A-6
Multiple FJUs A-5
TADIL A A-4
TADIL B A-4, A-8
Frame 5-8
Free-Text Messages 5-22, 5-27 (fig.)
Frequency
Hopping 1-8, 5-44, 5-52, 5-55, 6-57
Interference 5-61, 5-62
Intermediate 2-25
JTIDS 5-54, 5-55 (fig.), 5-60 (fig.)
Spectrum 5-53 (fig.)
TACAN/DME 5-56, 5-57 (fig.)
G
Geodetic Positioning 1-23, 6-29, 6-42
Global Memory 2-24
H
Handovers 7-15, 7-16
Header 5-22, 5-28, 5-45
Type field 5-46
Type modifier 5-46
High Power
Amplifier group 2-26, 5-66
Authorization 5-66
Host 4-9
Housekeeping Words 4-2, 4-26 ff., 4-27 (fig.)
I
Identification. See PPLI
IFF 5-54, 5-58, 5-59 (fig.)
J
J-Series Messages 4-2, 4-6
Catalog 4-7 (fig.)
Continuation word 4-11, 4-16, 5-23, 5-24 (fig.)
Extension word 4-11, 4-16, 5-23, 5-24 (fig.)
Fixed-format 5-23
Initial word 4-11, 4-16, 5-23, 5-24 (fig.)
No Statement word 5-23
Standards 5-23
Jitter 5-19, 5-33, 5-47 ff.
JTIDS 1-2
Antennas 2-32
Architecture 1-14 ff.
Bilingual terminal 1-4
Emissions requirements 5-62
Features of the architecture 1-14
Frequencies 5-54, 5-55 (fig.)
RF signal 5-52 ff.
Security 1-15
Shipboard terminal 2-14
JTIDS Network Library 2-31, 3-18, 3-28, 6-25
JTIDS Terminal 2-14 ff.
Airborne 3-6
Components 2-19, 2-20 (fig.), 3-6
Controls and indicators 2-29
Initialization 2-31, 3-18, 4-11, 6-26
Major functions 2-13 (fig.)
Message buffering 6-16
Navy variants 3-6
TACAN function 3-6, 4-32
JU
Addresses 1-19
Forwarding 6-33, A-3
Initial Entry 6-29
K
Keyer Control Panel 2-31
L
L Band 5-53
Land points 1-25
Line of sight 3-7
Lines 1-22, 7-10
Link-11
Architecture 1-6 (fig.)
Backward implementation 7-4
Data exchange 1-10
Link-16 1-2
Air control 7-14
Airborne equipment 3-1 ff.
Antennas 2-32, 3-18, 3-28
Architecture 1-8, 1-9 (fig.), 1-44 ff.
Autonomous operation 7-2
Capabilities 1-18 ff.
Data exchange 1-10
Data flow 2-35
Design goals 7-2 ff.
Features 1-5, 1-13 (fig.)
Implementation 1-27
Messages 5-22 ff.
Model 4 2-3
Model 5 2-6
Number of participants 1-19
Platforms App B
Range 3-7
Shipboard equipment 2-1
Track numbers 1-20
Link-4A
Air control 7-14
Architecture 1-7 (fig.)
Data exchange 1-10
Long Term Transmit Inhibit 6-32, 6-49
Loopback ID 4-11
Low Probability of Intercept 5-44
Lx Band 5-53
M
Machine Receipt 6-44
MDCTI 4-13, 4-19
Message security 1-15
Messages
Buffering 6-16
Common carrier 4-11
Filtering by the FJU A-9
Filtering by the tactical system 7-11
Filtering by the terminal 4-16
Fixed format 5-22, 5-23, 5-24 (fig.)
Free text 5-22, 5-27 (fig.)
Header 5-22, 5-28
IJMS 6-14
J-series 4-2, 4-6 ff.
Link-16 5-22 ff.
Loopback of 4-23
M-series 1-10
N-series 4-2, 4-4 ff.
P 6-14
Packing formats 5-28, 5-45
Packing limitations 5-50
R-series 1-10
Round-trip timing 5-22
Residual 6-14
Standardization 7-3
T 6-14
Terminal-initiated 2-37
TIMs 4-2, 4-9
TOMs 4-2
Translation in the C2P 4-8
V-series 1-10
Variable format 5-22, 5-26 (fig.)
Voice 5-27
MIDS 1-2
Mission Management 6-8
Model 4 2-3
AEGIS equipment configuration 2-4
CDS equipment configuration 2-5
Model 5 2-6
AEGIS equipment configuration 2-6
ACDS equipment configuration 2-7
Airborne platforms 3-2, 3-5
Normalized data 4-4
Mode S IFF 5-58
Modes
Communication 5-52
EW 7-7, A-21
Modulation
Carrier 5-41, 5-42 (fig.)
CCSK 5-38
CPSM 2-25, 5-41
Data flow 2-36
FSK 5-41
Multilink
Capability 3-4
Data forwarding A-3
Functions A-14
Operations A-2
Platform status A-20
N
N-series Messages 4-4 ff.
Navigation
Controller 6-30, 6-42
DTBs 4-25
Geodetic 1-23, 4-18, 6-29
Relative 1-24, 2-16, 4-18, 6-5, 6-7, 6-30, 6-39
Secondary Controller 6-31
Systems 5-56
Needline Participation Groups 6-3
Net Crypto 6-62
Entry 6-5, 6-29, 6-35 ff.
Multiple 5-16, 5-17 (fig.)
Single 5-16
Stacked 1-8, 1-17, 5-16, 6-60
Net Entry Control Terminal 6-29
Net Number 5-16, 6-40, 6-59
Default 6-57
Dial-a-net 6-61. See also Stacked Nets
Net Time Reference 5-18, 6-5, 6-35
Network
Design 6-25
Functional structure 6-1 ff.
Management 7-17, 6-26
Manager 6-34
Multiple 6-62
Participation groups 6-2 ff.
Physical structure 5-1 ff.
Roles 6-27 ff.
O
OPTASK LINK 2-31, 5-66, 6-25, 6-27
P
Packed-2 5-28, 5-30, 5-45
Double pulse 5-49 (fig.), 5-51
Single pulse 5-48 (fig.)
Packed-4 5-28, 5-30, 5-45, 5-50 (fig.)
Packing Structures 5-46 (fig.)
Formats 5-46 (fig.)
Limitations 5-50
Packed-2 5-28, 5-30, 5-45, 5-48 (fig.), 5-49 (fig.)
Packed-4 5-28, 5-30, 5-50 (fig.)
Standard 5-28, 5-30, 5-47 (fig.)
Upper packing limit 5-51
Parametrics 7-7
Parity 5-25, 5-29 (fig.)
Participation Groups 6-3 (fig.).
See also Network Participation Groups
Partitioned variable mode 6-57
Passive Synchronization 6-32, 6-37, 6-42
Peacetime Constraints 5-63, 5-67 (fig.)
Plain Text Processor 4-26
Platforms App B
Position. See also PPLI
Geodetic 1-23, 6-29, 6-42
IJMS 6-14
Quality 6-42, 6-43
Reference 6-29, 6-42
Relative 6-30, 6-42
Power
High 2-26, 5-66
Low 2-25, 2-26, 5-66
TACAN/DME 5-57
Power Interface Units 2-28
Powers of 2 5-5 (fig.)
Q
Quality
Position 6-42, 6-43 (fig.)
Reported in TOM 4-18
Time 5-18, 5-32, 5-33, 6-28, 6-41 (fig.)
R
Radio Horizon 3-2
Distance to 3-7, 3-8 (fig.), 3-9 (fig.)
and Effective earth radius 3-7
Radio Path Length 3-9 (fig.)
Radio Silence. See Long Term Transmit Inhibit
Range
Extended 5-21, 5-51, 6-63
Line-of-sight 3-7, 3-8
Normal 5-21, 5-51
Round-Trip Timing
Calculation 5-37 (fig.)
Interrogation 5-33
Message formats 5-34 (fig.)
NPGs 5-33
Reply 5-34
S
Satellite communications 6-63
Secondary Navigation Controller 6-31
Secondary User 6-32
Secure Data Unit 2-25, 2-31, 5-28, 5-34
Secure voice 2-17
Security
Communications 6-54 ff.
Crypto period designator 6-55, 6-56 (fig.)
Cryptovariables 6-54
Cryptovariable Logical Label 6-54 ff.
Message 1-15, 6-57
Secure Data Unit 2-25, 2-31, 5-28, 5-34
Transmission 1-15, 5-40, 6-57
Set 5-3
SICP 2-22, 4-9, 6-16
Signal Power 2-25
Simulation indicator 7-12
Single Pulse 5-43
Packed-2 5-48 (fig.)
Packed-4 5-50 (fig.)
Slot Index 5-3
Source Track Number 6-39
Spread Spectrum 5-38
T
TACAN
Control 4-32
Description 5-56, 5-57 (fig.)
Frequencies 5-53, 5-56
Terminal function 3-6, 3-17, 3-23
TOM 29 4-18
Tactical Data System 2-8 ff.
Certification 2-10
Major functions 2-9 (fig.)
TADIL 1-2
TAMPS 3-18, 3-28
Tape Recording 4-14
TDMA 5-2 ff., 5-21
Terminal Input Messages 4-9 ff.
Terminal Output Messages 4-14 ff.
Time
of Arrival 5-34 ff.
Quality 5-18, 5-32, 5-33, 6-28, 6-41 (fig.)
Refinement 5-20, 5-44
Slice 5-17
System 5-18, 6-28
Time Slot 5-3
Access modes 6-19 ff.
Anatomy 5-38 ff.
Assignment 5-10, 6-4, 6-17 ff.
Components 5-19
Data 5-20
Donated 6-45
Duration 5-3
Header 5-20, 5-22, 5-28, 5-43
Index 5-3
Interleaving 5-3
Transmission
Inhibit 6-32
Security 1-15, 5-40
Symbol 5-40
Type 5-46
Type Modifier 5-46
U
UHF 5-52
Unit Types 6-18 (fig.)
Uplink. See Air Control
Upper Packing Limit 5-51
Users 6-32
V
Variable-Format Messages 5-22, 5-26 (fig.)
Voice 4-29 ff.
Channel selection 3-17
Channel status 4-24
Data rates 4-31 (fig.)
Free-text messages 5-27
Group A 6-11
Group B 6-12
Receive processing 4-30
Terminal function 2-17
Transmit processing 4-30
VOR 5-56
VORTAC 5-56
W
Weapons Coordination 6-12, A-20
Word
CCSK code 5-39 (fig.)
Continuation 4-11, 4-16, 5-23, 5-24 (fig.)
Extension 4-11, 4-16, 5-23, 5-24 (fig.)
Initial 4-11, 4-16, 5-23, 5-24 (fig.)
No Statement 5-23
R-S code 5-25 ff.
Comments,
Suggestions,
and Ordering
Attention: Guidebooks
Northrop Grumman Corporation
Communication & Information Systems Division
4010 Sorrento Valley Boulevard
San Diego, California 92121-1498, USA
E-mail: guidebook@northropgrumman.com
Headquarters
Navy Center for Tactical Systems Interoperability
CAPT Ian Fetterman, Commanding Officer
53690 Tomahawk Drive, Suite A125
San Diego, California 92147-5082
Telephone: 619-553-7304 FAX: 619-553-9366
(DSN 553)
Fleet Support
LCDR James Darenkamp
Telephone: 619-553-0768
FAX: (619)553-0767 (DSN 553)
Detachments Detachments
Pacific Fleet: Atlantic Fleet:
NCTSI Detachment ONE NCTSI Detachment TWO
OIC LCDR Randall Peters OIC LCDR Dan Wessman
53610 Catalina Boulevard 1911 "D" Avenue
San Diego, California 92147-5086 Naval Station, Norfolk, Virginia 23511-3798
Telephone: 619-553-0264 (DSN 553) Telephone: 757-444-5509 (DSN 564)
FAX: 619-553-0260 FAX: 757-445-4036 (DSN 565)
NCTSI