background image

     ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M)

24

Copyright © 2020 Advanced Simulation Technology inc.

5.5.1. Setting Up the Federation

This section assumes that the RTI and federate software are properly installed on two Targets. 
This example will use the DMSO RTI (1.3NGv4) and, for the purposes of this scenario, the 

rtiexec

 process will run on one of the two Targets. Only one 

rtiexec

 process should exist 

on the network. For performance reasons, ASTi recommends running this process on a separate 
machine during an actual exercise and 

NOT

 on one of the Targets.

1. Start the RTI as described above.

2. On each machine, run the host emulator utility from any console.

3. Then enter the command “

join

.”

Wait for the federate software to return “

JOIN OK

” to indicate a successful join

operation. If the software returns “

JOIN FAIL

”, double check the network configuration

on each machine.

4. The 

rtiexec

 should then indicate successful federate initialization.

At this point, there is an “ASTi” federation with two joined federates. Note that the federate name 
for each Target was generated based on the hostname and IP address of the individual machine. To 
properly destroy the federation:

• Resign each federate by typing “

resign

” at the 

Telestra >

 prompt on both Targets.

• Stop the 

rtiexec

 process using 

CTRL+C

.

Содержание Telestra Target

Страница 1: ...r Park Drive ASTi Telestra Target Operation and Maintenance Manual Document DOC TEL NA OM M 2 Advanced Simulation Technology inc 500A Huntmar Park Drive Herndon Virginia 20170 USA Revision M Version 2...

Страница 2: ......

Страница 3: ...lestra Restricted Rights Use duplication or disclosure by the Government is subject to restrictions as set forth in sub paragraph c 1 ii of the Rights in Technical Data and Computer Software clause at...

Страница 4: ......

Страница 5: ...tem Configuration 9 3 3 Software Installation and Configuration 10 3 3 1 Network Ports 10 3 4 Default Network Settings 11 3 5 Connections 12 3 5 1 Connecting ACENet Devices 12 3 5 2 Power Connection 1...

Страница 6: ...urity Package Installation 30 Chapter 7 Warranty and Repairs 31 7 1 Warranty Information 31 7 2 Repairs and Returns 31 7 3 Disclaimer and Warnings 32 Appendix A System Specifications 33 Temperature an...

Страница 7: ...onmental cue modeling The Target connects to ASTi s flexible networked based ACENet architecture which provides a wide range of high fidelity scalable digital 48 kHz audio and I O peripherals The Targ...

Страница 8: ...name instead of an IP address Reference the ASTi ACENet Guide for more information 3 The Target runs a custom Project that processes the audio and simulates radios intercom systems or sounds such as...

Страница 9: ...h l i CHANNEL C CHANNEL D CHANNEL A CHANNEL B POWER STANDBY PROTECT DISABLE COM 1 2 3 4 5 6 7 8 Bridge Bridge Temp Clip Mute Clip Mute 12 12 18 18 6 6 Temp Current Current Headsets PTTs Speakers Micro...

Страница 10: ...Target Hardware Components The Target consists of a number of hardware components and can be configured in many different ways depending on the requirements of the particular application The componen...

Страница 11: ...ount system Target Depth Width Height Weight Standard 2U 22 3 4 17 3 1 2 31 lbs as shipped With Front Rackmount 24 19 with thumb screws 3 1 2 With Middle Rackmount 22 3 4 19 3 1 2 Table 1 Telestra Tar...

Страница 12: ...supported along with some multicast capabilities The following sections discuss the individual network features in more detail Host Simulation Simulation state and sound model control parameters gener...

Страница 13: ...flexible archi tecture provides highly scalable distribution network of model processing systems and remote audio and I O interface devices to address widely distributed and complex multi user sound a...

Страница 14: ...guration and debug of ASTi systems over LAN WAN from any standard computer with a proper web browser 2 2 2 Support and Utilities Software All Target configurations include Linux operating system softw...

Страница 15: ...in accordance with procedures common to industry standard practices Be sure to observe all notes caution or warning labels that may be present on the outside and inside of the shipping packages 3 2 P...

Страница 16: ...logins and passwords are case sensitive Login admin Password admin Login root Password abcd1234 3 3 1 Network Ports Each Target has two or more Ethernet network ports depending on the system configura...

Страница 17: ...o not wish to use DHCP to configure eth0 or if the network does not have a DHCP server the user must manually configure the network configurations including the IP address subnet mask and gateway IP A...

Страница 18: ...tems To chassis To wall Connects to monitor s 15 pin D connector PS 2 connection may not be purple in color Each system will have three 3 labeled jacks RJ 45 connection To network x3 Not Included Reme...

Страница 19: ...of a shielded twisted pair is for the microphone line Microphone lines usually carry a very small signal and typically run next to the headset line which typically has a much larger higher current si...

Страница 20: ...use of the Target The disclaimer applies to all parties using the Target in any situation or configuration This disclaimer should be read and understood completely before using the Target Disclaimer...

Страница 21: ...sed for your application or suggestions for future enhancements you can contact ASTi in the following ways By Email Send an email at any time to support asti usa com By Web Contact us through the ASTi...

Страница 22: ...t hlauser is created for user convenience WARNING ASTi recommends changing the password for the account immediately after software installation or cold start User Account Username Default Password HLA...

Страница 23: ...federation The host can also get the following information from the federate Joined resign status Current federate name federation name fed file name rid file name and conversion file name RTI networ...

Страница 24: ...y that it is working correctly To run the host emulator on the local platform log in as hlauser hostemu port number To connect to a port on a remote Target type the command hostemu port number IP addr...

Страница 25: ...ay be initiated by simply pressing the ENTER key See the sample output below life count 0x41 Attribute Updates rx 0x6 tx 0xc ignored 0x0 Interactions Audio rx 0x0 tx 0x0 TDL rx 0x0 tx 0x0 Attach rx 0x...

Страница 26: ...nt debug level If the command is entered without a value it will display the current debug level If entered with a level that debug level will be set The debug level parameter determines which combina...

Страница 27: ...VEN FAIL Two federates must use the same feder ation name to pass information between them The response to the JOIN command is either JOIN FederationName OK JOIN FederationName FAIL or JOIN Federation...

Страница 28: ...command can be entered at any time in order to leave the current federation To join a different federation it is not necessary to resign Issuing a new JOIN command will cause the Target federate to r...

Страница 29: ...system resident on the HLA network However to perform local only testing or stand alone tests it is possible to run the rtiexec on the Target The rtiexec will service every system on the network Prior...

Страница 30: ...NOT on one of the Targets 1 Start the RTI as described above 2 On each machine run the host emulator utility from any console 3 Then enter the command join Wait for the federate software to return JO...

Страница 31: ...ecurity features Red Hat Enterprise Linux version 5 x NIAP Approved OS Minimal OS Footprint Only essential OS elements are included For example the Target platform does not include a desktop environme...

Страница 32: ...s the ability to remove and secure non volatile media Diskless operation options also available Telestra Security Package features Note The Telestra Security Package is an optional software package fo...

Страница 33: ...mmediate access into a machine allow super user access or bypass a firewall Category II Vulnerabilities that provide information that have a high potential of giving access to an intruder Category III...

Страница 34: ...erability it represents Out of the hundreds of PDIs ASTi can eliminate the majority of them however the customer is responsible for eliminating several PDIs For example certain elements of the STIGS r...

Страница 35: ...ou will receive the security software version that was run against the November 15th 2007 DISA UNIX and Web Server SRRs Future Telestra security software packages upgrades that are required to match t...

Страница 36: ...ry contains a PDF that is provided to assist in the IA accreditation process The PDF is generated from the non ASTi generated DISA SRR results ASTi transforms the raw results generated from the DISA S...

Страница 37: ...ile the exterior container should use a more pliant shock absorbing material such as styrofoam peanuts The device should be properly enclosed in an antistatic bag to prevent possible ESD damage Failur...

Страница 38: ...hipment will not be tested After sixty 60 days ASTi reserves the right to scrap all hardware received in this condition 12 International customers must include the correct product value on all shippin...

Страница 39: ...32 131 F 0 55 C 10 95 0 8 000 ft 2 438 meters Reliability The ASTi sound system has been designed to use the minimal complexity of electronic hardware and the highest quality components Special attent...

Страница 40: ...get Operations Maintenance Manual Ver 2 Rev M 34 Copyright 2020 Advanced Simulation Technology inc Appendix B Software Version Release Notes Go to Telestra FAQs on the ASTi web site support asti usa c...

Страница 41: ...st be tested together in their target environment under operational conditions ASTi s Telestra HLA software supports the RTIs listed below ASTi s Telestra platform was tested with and supports several...

Страница 42: ...he files and ls a which will display all files and directories including hidden directories pwd This command returns the full path that you are currently in It is useful for seeing where you are in th...

Страница 43: ...eate and rename copies of any file in the file system You must always specify both the file being copied and the new file name See below for some examples mv oldfile newfile The Move command works exa...

Отзывы: