Title: EATMP Communications Strategy
1ACP - WGN -The EATM Communications Strategy
EATM Communications Strategy
Danny Van Roosbroek, EATM/DAS/CSM
Bangkok, 17-21 November 2003
2Background
- Documents
- Volume 1 - Executive Summary
- Volume 2 - Technical Description
- Versions
- October 1998 Initial Version
- February 2001 First update
- June 2003 Second update
- Provides direction for development of comms
services and infrastructure - not a work
programme or plan for implementation - Strategy focuses on most promising paths for
implementation - Strategy involves all Stakeholders
3Contents Volume 2
1. About this Document 2. Introduction
3. Overview of
Communications Strategy 4. Requirements
5. Opportunities and
Constraints 6. Communications Services
7. List of Strategy Elements
8. Maintenance of the Strategy 9.
Appendix A - Glossary 10. Appendix B -
References
4Changes to Chapters 1 - 5
- Alignment with the latest ATM2000 Strategy
- Changes due to EU legislation Single Sky
- Emphasis on regulation to enforce standards
5The COM Domain (Fig. 6)
6Communication Domain
Air / Air Data / Voice networks
Mgt Alloc of frequencies
A/G Data / Voice Networks
A/G Data / Voice End-to-End Services
PENS
ATC / Airport
G/G Data / Voice End-to-End Services
A/G Data / Voice networks
Ground / Mobile Data / Voice End - to - End
Services
ATC / Airports ....
7Data Communication Services (6.2)
- Examples OLDI, CPDLC, CDM, ASAS, Met data, ...
- Strategy
- To evaluate requirements, specify and implement
new data communication services based on evolving
or new operational concepts (Vol1, Ch4) - Changes
- Study criteria to select data distribution
mechanism point-to-point (EAD model) and/or
store and forward (AMHS) - External communication services for Air Defence
and Meteorological info
8Voice Communication Services (6.3)
- Controller-Pilot / Air-to-Air / Ground Mobile /
Ground - Ground - Strategy
- To evaluate new requirements for seamless voice
communication in the gate-to-gate context ...
(Vol1, Ch4) - To evaluate the end-to-end performance
requirements relating to signalling and speech
quality... (Vol1, Ch4) - Changes
- none
9PENS (6.4)
10PENS Data Networks (6.4.2)
- Strategy
- To implement the transition from legacy CONS to
high QoS COTS-based IP technology to support
current and future application requirements
(Vol1, Ch4) - Changes
- Implementation of ECAC wide IP network
- Migration of OLDI to IP Migration of ASTERIX
(for surveillance) application to IP - ATN air-ground data (e.g. CPDLC) over IP ground
networks
11PENS - Data Networks
ATN Internet (LINK2000)
Frame Relay / Asynch. Transfer mode
Possible new Technologies e.g.
MPLS
X.25 based
Bilateral and International IP Connectionless
Network Service
National IP
2000
2005
2010
2015
2020
12PENS - Message Handling (6.4.2)
- Strategy
- To implement an international Aeronautical
Message Handling Service (AMHS) with appropriate
Gateways to AFTN (ECG) (Vol1, Ch4) - Changes
- Implementation of AMHS over TCP/IP in the EUR
region - Migration of AMHS to an IP COTS-based messaging
(long term)
13PENS - Message Handling
National
Bilateral
ECAC AMHS
AMHS / IP Messaging Gateway
AMHS/CIDIN/AFTN Gateway (ECG)
(External)
AFTN / CIDIN
(External)
National IP Messaging
Bilateral / International
2020
2000
2005
2010
2015
14Voice Fixed Network Services (6.4.3)
- Strategy
- To implement an improved digital signalling
system (ATS QSIG and PNNI) for ground-ground
voice communications to replace analogue
signalling systems (e.g. MFC-R2) (Vol1, Ch4) - To evaluate End-to-end performance requirements
relating to signalling and speech quality,
including consideration of the potential benefits
of Voice over IP (Vol1, Ch4) - Changes
- Support to B-QSIG withdrawn in favour of VOIP
- Transition from analog to digital signalling
system spread over longer time frame - Slower introduction of intl VOIP
15PENS - Voice Fixed Network Services
International Voice over IP
National Voice Over IP
ATS-QSIG based Voice Network
Analogue Voice Network
(External)
2020
2000
2005
2010
2015
16Mobile Network Services (6.5)
17Mobile Network Services (6.5)
- Strategy
- To implement a VDL-Mode 2 air-ground sub-network
as the first ATN sub-network, for operation in
the short term (Vol1, Ch4). - Continue the feasibility analysis, to define the
baseline for next generation mobile
communications systems, to support ATM voice and
data services beyond 2010, (replacing To
study the requirements for future air-ground
sub-networks, in order to identify candidate
solutions for beyond 2005 (Vol1, Ch4)
18Mobile Network Services (6.5)
- Changes
- 8.33 kHz - Vertical Extension update following
decision at ICAO/EANP 44 - Inclusion of Satellite and Wideband as possible
Next Generation Systems - Removal of Gatelink as possible technology to
support ATS air/mobile applications - For surveillance applications (e.g. ADS-B)
Extended Squitter complemented by VDL4 (pending
study results)
19Mobile Networks
Additional sectors above FL 245 (HEX)
Initial deployment above FL 245
8.33 KHz DSB-AM
8.33 kHz DSB-AM
Extension below FL 245 to FL195 (VEX)
Designated Control Areas (VEX)
Voice Services
25 kHz DSB-AM
New Voice System
VDL 4 for surveillance
Surveillance
1090 Extended Squitter for surveillance
New Data System
Data Services
Decision needed
ATN/VDL2
DCL-ATIS/AOA/VDL2
DCL-ATIS/ACARS
2000
2005
2010
2015
2020
20System Wide Aspects
- Strategy
- To implement systems management in support of
network services on an international basis (Vol1,
Ch4) - To evaluate the adoption of industry standards
and COTS products and services for future
aeronautical applications (Vol1, Ch4) - To conduct a study to specify and standardise
ECAC-wide security mechanisms (both technical and
procedural) to protect information flows from
attack and cyber-terrorism using the
ground-ground or air-ground communications
infrastructure (Vol1, Ch4) - To support ongoing improvements in the management
of frequency spectrum for aeronautical purposes.
To promote the interests of the aeronautical
community at the appropriate international fora
for spectrum allocation. (Vol1, Ch4) - Changes
- Emphasis on mechanisms to protect against
cyber-crime and cyber-terrorism
21Thank You