Refine Your Search

Topic

Author

Affiliation

Search Results

Standard

TOLERANCES, METRIC Aluminum Alloy Drawn Tubing

1994-04-01
MAM2203A
This specification covers established metric manufacturing tolerances applicable to aluminum alloy drawn tubing ordered to metric dimensions. These tolerances apply to all conditions, unless otherwise noted. The term "excl" applies only to the higher figure of the specified range.
Standard

TOLERANCES, METRIC Aluminum Alloy Drawn Tubing

2002-07-23
MAM2203
This specification covers established metric manufacturing tolerances applicable to aluminum alloy drawn tubing ordered to metric dimensions. These tolerances apply to all conditions, unless otherwise noted. The term "excl" applies only to the higher figure of the specified range.
Standard

COMMUNICATIONS MANAGEMENT UNIT (CMU) MARK 2

2019-11-26
CURRENT
ARINC758-4
This ARINC Standard specifies the ARINC 758 Mark 2 Communications Management Unit (CMU) as an on-board message router capable of managing various datalink networks and services available to the aircraft. Supplement 4 adds Ethernet interfaces, per ARINC Specification 664 Part 2. This will allow the CMU to communicate with IP based radio transceivers (e.g., L-Band Satellite Communication Systems (Inmarsat SwiftBroadband (SBB) and Iridium Certus), ACARS over IP, AeroMACS, etc.).
Standard

Manufacturing Message Specification – Service Definition and Protocol

2016-06-28
CURRENT
EIA511
The Manufacturing Message Specification is an application layer Standard designed to support messaging communications to and from programmable devices in a Computer Integrated Manufacturing (CIM) environment. This environment is referred to in this Standard as the manufacturing environment. This Standard does not specify a complete set of services for remote programming of devices, although provision of such a set of services may be the subject of future standardization efforts.
Standard

AIRCRAFT DATA NETWORK, PART 1, SYSTEMS CONCEPTS AND OVERVIEW

2019-06-20
CURRENT
ARINC664P1-2
The purpose of this document is to provide an overview of data networking standards recommended for use in commercial aircraft installations. These standards provide a means to adapt commercially defined networking standards to an aircraft environment. It refers to devices such as bridges, switches, routers and hubs and their use in an aircraft environment. This equipment, when installed in a network topology, can optimize data transfer and overall avionics performance.
Standard

GUIDANCE FOR DISTRIBUTED RADIO ARCHITECTURES

2021-07-15
CURRENT
ARINC678
The purpose of this document is to evaluate Communication, Navigation, and Surveillance (CNS) Distributed Radio architectures and the feasibility of distributing the RF and systems processing sections to ensure the following: Reduce cost of equipment Reduce Size, Weight, and Power (SWaP) Ease of aircraft integration Growth capability built into the design Maintain or improve system availability, reliability, and maintainability It provides a framework to determine whether it is feasible to develop ARINC Standards that support CNS distributed radio architectures.
Standard

AIRCRAFT AUTONOMOUS DISTRESS TRACKING (ADT)

2019-08-26
CURRENT
ARINC680
This document describes the technical requirements, architectural options, and recommended interface standards to support an Autonomous Distress Tracking (ADT) System intended to meet global regulatory requirements for locating aircraft in distress situations and after an accident. This document is prepared in response to International Civil Aviation Organization (ICAO) and individual Civil Aviation Authorities (CAAs) initiatives.
Standard

INTERSYSTEM NETWORK INTEGRATION

2021-06-24
CURRENT
ARINC688
The purpose of this document is to provide guidelines for integrating previously standalone cabin systems such as cabin management systems, In-Flight Entertainment (IFE) systems, In-Flight Connectivity (IFC) systems, galley systems, surveillance systems, etc. Resource sharing between systems can reduce airline costs and/or increase functionality. But, as systems expose their internal resources to external systems, the risk of an intrusion that could degrade function and/or negatively expose the supplier’s or airline’s brand increases. This document provides a recommended IP networking design framework between aircraft systems to reduce the operational security threats while still supporting the necessary intersystem routing.
Standard

ONBOARD SECURE WI-FI NETWORK PROFILE STANDARD

2021-06-18
CURRENT
ARINC687
This document defines a standard implementation for strong client authentication and encryption of Wi-Fi-based client connections to onboard Wireless LAN (WLAN) networks. WLAN networks may consist of multi-purpose inflight entertainment system networks operating in the Passenger Information and Entertainment System (PIES) domain, dedicated aircraft cabin wireless networks or localized Aircraft Integrated Data (AID) devices operating in the Aircraft Information Services (AIS) domain. The purpose of this document is to focus on the client devices requiring connections to these networks such as electronic flight bags, flight attendant mobile devices, onboard Internet of Things (IoT) devices, AID devices (acting as clients) and mobile maintenance devices. Passenger devices are not within the focus of this document.
Standard

ROADMAP FOR IPV6 TRANSITION IN AVIATION

2020-06-19
CURRENT
ARINC686
ARINC Report 686 represents the consensus of industry to prepare a roadmap migration from IPv4 to IPv6. This document describes airline objectives (air and ground side when possible) towards the development and introduction of IPv6. There are three distinct elements considered: 1) the applications for addressing aspects 2) the communication network(s) over which the applications are running for the IP protocol level itself and associated features, and 3) the physical link(s) the network(s) interface.
Standard

TIMELY RECOVERY OF FLIGHT DATA (TRFD)

2021-08-06
CURRENT
ARINC681
The difficulty in locating crash sites has prompted international efforts for alternatives to quickly recover flight data. This document describes the technical requirements and architectural options for the Timely Recovery of Flight Data (TRFD) in commercial aircraft. ICAO and individual Civil Aviation Authorities (CAAs) levy these requirements. The ICAO Standards and Recommended Practices (SARPs) and CAA regulations cover both aircraft-level and on-ground systems. This report also documents additional system-level requirements derived from the evaluation of ICAO, CAA, and relevant industry documents and potential TRFD system architectures. It describes two TRFD architectures in the context of a common architectural framework and identifies requirements. This report also discusses implementation recommendations from an airplane-level perspective.
Standard

CABIN ARCHITECTURE FOR WIRELESS DISTRIBUTION SYSTEM

2019-08-13
CURRENT
ARINC820
This document defines a secure Wi-Fi distribution network installed in the aircraft passenger cabin for passenger and crew use. Carry-on Portable Electronic Devices (PEDs) such as smart phones, tablets, and laptops may use this network to access public internet services provided on the aircraft.
Standard

MEDIA INDEPENDENT SECURE OFFBOARD NETWORK

2020-06-19
CURRENT
ARINC848
ARINC Specification 848 is a functional standard based on a protocol specification profile for a secured network interface. The purpose is to define a common method of initiating a mutually authenticated tunnel between an aircraft service and its Enterprise service. ARINC Specification 848 defines a standard implementation for securing the communications between an onboard Local Area Network (LAN) and an Enterprise LAN on the ground. Various aircraft network architectures and various air to ground communication channels (aka media) are accommodated in this document. For example, L-band Satellite Communication (Satcom), Ku/Ka-band Satcom, Gatelink Cellular, and Gatelink are considered.
Standard

INTERNET PROTOCOL SUITE (IPS) FOR AERONAUTICAL SAFETY SERVICES PART 1 AIRBORNE IPS SYSTEM TECHNICAL REQUIREMENTS

2021-06-21
CURRENT
ARINC858P1
ARINC 858 Part 1 defines the airborne data communication network infrastructure for aviation safety services using the Internet Protocol Suite (IPS). ARINC 858 builds upon ICAO Doc 9896, Manual on the Aeronautical Telecommunication Network (ATN) using Internet Protocol Suite (IPS) Standards and Protocol. IPS will extend the useful life of data comm services presently used by operators, e.g., VDL, Inmarsat SBB, Iridium NEXT, and others. It represents the evolutionary path from ACARS and ATN/OSI to the end state: ATN/IPS. ARINC 858 includes advanced capabilities such as aviation security and mobility. This product was developed in coordination with ICAO WG-I, RTCA SC-223, and EUROCAE WG-108.
Video

Fault-Tree Generation for Embedded Software Implementing Dual-Path Checking

2011-11-17
Given the fast changing market demands, the growing complexity of features, the shorter time to market, and the design/development constraints, the need for efficient and effective verification and validation methods are becoming critical for vehicle manufacturers and suppliers. One such example is fault-tree analysis. While fault-tree analysis is an important hazard analysis/verification activity, the current process of translating design details (e.g., system level and software level) is manual. Current experience indicates that fault tree analysis involves both creative deductive thinking and more mechanical steps, which typically involve instantiating gates and events in fault trees following fixed patterns. Specifically for software fault tree analysis, a number of the development steps typically involve instantiating fixed patterns of gates and events based upon the structure of the code. In this work, we investigate a methodology to translate software programs to fault trees.
Video

Sensor Video Integration and Processing in the Modular Avionics Architecture

2012-03-19
Use of airborne high resolution digital sensor imagery is ever increasing. Color HDTV, infrared cameras and radar are examples of such sensors. And they are becoming increasingly used for mission purposes by the military, police, customs and coast guard onboard helicopters and fixed wing aircraft. These users have requirements for onboard presentation, analysis and storage. Use of weather radars and other similar types of sensors are flight oriented applications in major types of aircraft. Another application is the integration of cockpit and cabin surveillance systems onboard commercial airlines. Cabin surveillance systems, growing from cockpit door cameras to complete cabin surveillance, will use several cameras. The purpose is to acquire and store imagery from un-normal events including unruly passengers and eventual terrorists. The primary intentions are security awareness in the cockpit as well as collecting evidence for a potential prosecution.
Video

Using SCADE System for the Design and Integration of Critical Systems

2012-03-14
This presentation shows the SCADE System product line for systems modeling and generation based on the SysML standard and the Eclipse Papyrus open source technology. SCADE System has been developed in the framework of Listerel, a joint laboratory of Esterel Technologies, provider of the SCADE�, and CEA LIST, project leader of the Eclipse component, Papyrus. From an architecture point of view, the Esterel SCADE tools are built on top of the SCADE platform which includes both SCADE Suite�, a model-based development environment dedicated to critical software, and SCADE System enabling model-based system engineering. SCADE System includes Papyrus, an open source component (under EPL license), integrated in the modeling platform of Eclipse. Using this integrated modeling platform, both system and software teams share the same environment for system development. Furthermore, other model-based tools can be added to the environment, due to the use of Eclipse.
Video

Advancing Aircraft Cyber Security - Potential New Architectures and Technologies

2012-03-16
Cyber security in the aviation industry, especially in relation to onboard aircraft systems, presents unique challenges in its implementation and management. The cyber threat model is constantly evolving and will continually present new and different challenges to the aircraft operator in responding to new cyber threats without either invoking a lengthy software update and re-certification process or limiting aircraft-to-ground communications to the threatened system or systems. This presentation discusses a number of system architectural options and developing technologies that could be considered to enhance the aircraft cyber protection and defensive capabilities of onboard systems as well as to minimize the effort associated with certification/re-certification. Some of these limit the aircraft?s vulnerabilities or in cyber terms, its ?threat surface?.
X