Length: 1 Day
Print Friendly, PDF & Email

TTNT Architecture and Protocols

TTNT Architecture and Protocols Training covers all aspects of TTNT network architecture and protocols. TTNT represents a secure, robust, and low latency IP-based TDL waveform delivering the fastest ad-hoc mesh network to the tactical edge patented by Rockwell Collins.

Tactical Targeting Network Technology (TTNT) is a secure and robust IP-based waveform that delivers the fastest ad hoc mesh network to the tactical edge.

Tactical Targeting Network Technology (TTNT) is an essential part of the modern defense and military landscapes, in no small part because of the way it satisfies the Department of Defense’s Airborne Networking requirements.

Who Should Attend?

This course is designed for electronic warfare, avionics systems engineers, system architects, hardware and software engineers, and employees with little or no TTNT experience. The course is also useful for those who have experience with TTNT but have never had any formal training on TTNT.

What You Will Learn

  • An overview of TTNT
  • A summary of TTNT key features, principles, and applications
  • Overview of TTNT building blocks
  • Details of TTNT architecture, interfaces and protocols
  • An overview of TTNT hardware/software/management
  • How to architect and design a TTNT capability

Training Objectives

Upon the completion of Introduction to TTNT training for managers, the attendees will:

  • Describe the key concepts, features and mechanisms behind TTNT
  • Explain the motivation behind the use of TTNT
  • Describe key protocols, interfaces, architectural building blocks and design considerations for a TTNT enabled system or node
  • Discuss TTNT message structure, syntax, formats and protocols
  • Summarize required TTNT IP-based protocols
  • Summarize TTNT considerations in terminals, interfaces, network communications and protocols
  • Learn about Ethernet L2, TCP/UDP/IP, SNMP and IP routing protocols used in TTNT

Course Content

Introduction to Tactical Targeting Network Technology

  • What is Tactical Targeting Network Technology (TTNT)?
  • TTNT benefits
  • Overview of TTNT features
  • Throughput, anti-jam, low latency, quick net join, waveform for IP connectivity
  • TTNT waveform
  • TTNT waveform integration with JTRS terminals
  • TTNT Design Principles
  • Enhancements to Traditional TDLs
  • TTNT Networking Principles
  • Ad-Hoc Wireless Networking
  • TTNT Signal Structure
  • TTNT Power and Transceiver

Overview of Joint Tactical Radio Systems (JTRS)

  • Network-Centric Warfare (NCW) concept Family of multi-band/multi-mode SDRs
  • Communications within the 2MHz to 2GHz frequency range
  • JTRS advanced waveforms
  • TTNT as a dynamic, robust waveform enabling NetCentric communications
  • Joint Enterprise Network Manager software
  • Multifunctional Information Distribution System (MIDS) for JTRS
  • MIDS for JTRS radios
  • JTRS family of radios with TTNT waveform
  • Joint Aerial Layer-Tactical Edge waveform
  • JTRS features for Link 16 and TTNT host platform
  • MIDS-J radio in their combat aircraft as the host for the TTNT waveform

TTNT (Tactical Targeting Networking Technology) Architecture and Protocols

  • TTNT architecture and protocols
  • TTNT interfaces
  • TTNT as a high speed data link airborne network
  • Enhancements to Traditional TDL
  • No Mission Planning
  • Deterministic Latency
  • Priority based IP and Non-IP Interface
  • Dynamic Network Management (OAM&P)
  • SNMP (simple network management protocol) for Network Management (NM)
  • Enhancements to Traditional TDL
  • TTNT radio set physical implementations
  • Principles of Software-defined radio (SDR)
  • UHF Vehicular Multichannel Software Defined Radio
  • TTNT operational procedures
  • TTNT mobility, versatility, interoperability and exchange of information on the battlefield
  • Methods to detect, track and prosecute time critical targets
  • Connectivity between manned and unmanned airborne platforms and ground stations
  • Standard IP for communication between platforms
  • Methods to precise geolocation of the enemy target.
  • Data transmission rate
  • Audio and live video to control headquarters.
  • Automatic ad hoc networking
  • Forming a net or performing a net-entry
  • Issues with network re-planning

Data Link Transceivers for TTNT

  • MIDS JTRS
  • TTNT vs. Link 16 and JREAP
  • TTNT and existing Link-16 terminal/Multifunction Information Distribution System Low Volume Terminal (MIDS LVT)
  • TTNT waveforms as software applications on JTRS radios
  • TTNT frequency band analysis by application
  • Wireless Broadband in the 1755 – 1850 MHz Band
  • TTNT Porting
  • TTNT Transceiver
  • TTNT Ext PA
  • TTNT WF
  • TTNT Application data path
  • Common Operational Pictures (COPs)
  • Collaboration workspaces (e.g. instant messaging)
  • On-demand services
  • Relay IP-based layered communication
  • Statistical Priority-Based Multiple Access (SPMA) protocol
  • TTNT integration with  Line of Sight (LOS) and Beyond Line Of Sight (BLOS) communications
  • Pentagon’s JTRS waveform repository
  • TTNT link budget
  • TTNT Signal Structure
  • Hi Doppler Effect
  • Frequency Allocation
  • Link 16 Compatible
  • Multipath Performance
  • FEC Structure/Reed-Solomon Encoding
  • Receive while Transmit

TTNT Waveform

  • TTNT Waveform Version 7
  • Principles of Gaussian Minimum Shift Keyed (GMSK)
  • GMSK in Global System for Mobile Communications (GSM), Tactical Targeting Network Technology (TTNT) and Bluetooth
  • Stationary additive white Gaussian Noise (AWGN)
  • Frequency-Hopped (FH) waveforms
  • TTNT signal as a Frequency-Hopped Gaussian Minimum Shift Keying (GMSK) modulated waveform
  • TTNT variable and fixed parameters
  • TTNT GMSK generation block diagram
  • Adjacent-channel interference
  • Interception link
  • Low Probability of Intercept (LPI) characteristics
  • JTRS Enterprise Network Services (ENS)
  • Layer 3 common set of network services and capabilitie

Principles of Ad Hoc Networking

  • What is Ad Hoc networking?
  • Mobile Ad Hoc networking and military communications
  • Data networking, GPS, real-time video feeds, and satellite intelligence
  • Mobile Network building blocks
  • IP network on fixed wired infrastructure
  • Mobile wireless networks
  • Principles of Mobile Ad hoc NETwork (MANET)
  • MANET conventional networking solutions
  • Dynamic Link Exchange Protocol (DLEP)
  • Radio Aware Routing (RAR) family of protocols
  • Applying QoS
  • TTNT QoS requirements and system capacity.
  • Available bandwidth, delay, or link
  • Size, Weight and Power (SWaP)
  • SWaP and Ruggedization
  • Network solutions for the dynamic environment
  • Networked airborne audio and video services
  • Ad-hoc network implementation Using TTNT Radio

TTNT and Common Networking Services and Operations

  • Application layer services
  • Voice over IP
  • Video over IP
  • Airborne network vision
  • The Global Information Grid (GIG)
  • Emerging IP based terminals, systems, platforms, and ground sites
  • Routing architecture
  • Service Type and Protocols
  • On-demand ad hoc IP networking
  • Masterless self-healing networking capability

Internet Protocol Support (Full Stack)

  • IPv4, ICMP, IGMP
  • Internet Routing Unicast, Multicast, Inter & Intra domain
  • QoS DiffServ, IntServ, marking, policing, admission control, shaping, scheduling
  • Mobility Support Inter & Intra Domain Network
  • Infrastructure Services
  • DNS, DHCP, NTP, ARP
  • SNMPv3
  • Applications
  • Position Reporting
  • TTNT IP Routing Protocols
  • Autonomous Systems (AS)
  • OSPF
  • BGP
  • eBGP
  • iBGP
  • Airborne networks with Combat networks as separate Autonomous Systems (AS)

TTNT Network Security Features

  • IP Network Security 101
  • Ad-hoc IP Networking Security Requirements
  • PKI Assumption
  • PKI Domain Sets
  • TTNT Domain Classification
  • Ad Hoc PKI Connection
  • Ad Hoc Certificate Validation

TTNT Cybersecurity and Mitigation

  • TTNT Security 101
  • Cyber Security Standards Applied to TTNT
  • Building a Risk Management Program for TDLs including Link 16, JREAP, Link 22, TTNT, SADL, and MADL
  • TTNT Cybersecurity Assessment with Risk Management Framework (RMF)
  • TTNT Cyber Asset Identification and Classification
  • Identifying Critical Cyber Assets
  • Classifying TTNT Related Cyber Assets
  • Identifying TTNT Security Perimeter
  • Protecting TTNT, Ethernet (L2) and IP (L3) Cyber Assets

 

 

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.