Professional Documents
Culture Documents
Thames (1981), The ALR-46 Computer Graphics Systems
Thames (1981), The ALR-46 Computer Graphics Systems
EEME~~EE
UNCLASSIFIED
I 3
AFIT/6C5/EE/SGD18 N
E~hhEmhEohh
EE~hhChEuhE
I
EohhEEmhhhhhEI
mhhhhhhmhhhhh
_ IN
-AJ
THES IS
AFIT/GCS/EE/81D-18 J. Wayne Thames
THESIS
Air University
by
J. W. THAMES, BSEE
CIV USAF
December 1981
program.
Also. I thank my thesis readers, Dr. August Golden and Professor Charles
thesis.
Finally, I would like to thank Kirk for her help and encouragement
AccOssito n
ICAC
T'U
t i-f
AvI,!I!Ab tY CodeS
Avajil aiuror
DII-t
e
p51ci a l
L. .
"..
.~~ .....
...
~~~~~~~ ....... ........
Content&
Page
Preface . . . . . . . . . . . . . . . . . . . . . ii
List of Figures . .. ...... .. .. .. .. .. .. .... v
Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . ix
I. Introduction . . . . . . . . . *. . . . . .. .. 1
Background . . . . . . . . . . . . . . . . 1
Environment . . . . . . . . . * . . . . . . . . . . . . . . . 4
Scope D . . . . . . . * . . . . . . . . . . . 8
Proachm . . . . . . . . . . 0 . 7
Summary of Current s. .
l.e. .. . . . . . . . . . . 9
Approach .. . . . . . . . . . . . . 9
. . .
Thesis Development . . . . . . . . . . . . .. . . . 11
Introduction . . . . . . a . . a . . . . . . . 44
Software Overview . . . . . . . . . . . . . . . . . . 44
Operator Interface . . . . * * . . . * . . . . . . . . . s 45
Parameter Capability.... * . . . . . . . . . . . . . . 50
RWR Capability . . . . . . ... . . . . . . . . . . *. . 52
Parameter / RWR Datao . . . . . . . . . . . . . . . . 55
Selection of a Programming Language . o . . . . . . . . . . 58
Summary . . . . . . . . . . . . . . . . .. . . . . .. . 59
Introduction . . . . . . . . . . . . . . . . . . . . . . . 61
Logical Model o o . . . . . . . . . . . . . . . . . .. . 61
Physical Model . . . . . . ........ . . . . . 73
iii
Contgnts (cont.)
Summary . . . . . . . . . . . . . . . . . . . . . . . 78
Introduction a . .* . . . . .. * . . . . . . . . . . s. . . 79
Implementation . . . . . . .. . .. . * . .. . . ..
. 79
Testing . . . . * . . . . . . . . . . . . . . . . . 90
Summary .. . . . . . . . . . . . . .. . . .. . 94
Recommendations . . . . o . ..
. o o o * . . . . . . .. 96
Bibliography o o . . . . . . . . . . . . . . . . . . . . . . . . . 98
Vita . . . . . . . . . .. . . . . . . 231
List of Fijures
Figure Page
19 Context Diagram . . . . . . . . . . . . . . . . . . . . . . 64
20 System Diagram . . . . . . . . . . .. . . . . .. . . 65
v
List of Figures (contA
Figure Page
vi
Li~t gf Tables
Table Page
vii
AFIT/GCS/EE/8lD-18
The system is composed of the ALR-46 Radar Warning Receiver; real time
Tektronix model 4027 CRT and a Digital Equipment Corporation (DEC) model
module structure charts for the software design. The final software
DEC Pascal. The software was implemented and tested using a top down
current system. I'The data acquired by the hardware monitor from the
ALR-46 is passed to the PD? 11/34 for CGS analysis. This information is
viii
List of Acronyms and Abbreviations
EW Electronic Warfare
HIPO Hierarchical-Input-Process-Output
HM Hardware Monitor
ix
List of Acronyms and Abbreviations (cont.)
ML Missile Launch
PC Program Counter
PW Pulse Width
RF Radio Frequency
W/O Warnier-Orr
x
I. Tntroduction
The Air Force supports many Electronic Warfare (EW) systems. The
potential enemy action (Ref 1:1-2). The support responsibility for each
implement the change and distribute the modified system. The Electronic
either class of system is critical to the user and the EWAISF. The
system which would reduce the tim' required to evaluate and implement a
system change.
the pilot and insure the success of the mission by denying critical
the threat.
1-
The early EW systems were built using all hardware components (Ref
1:2-6). The time required to make a change to the system was excessive.
facility.
software support for Air Force Avionics Electronic Warfare systems. The
ALR-46 system is the most widely used of all the EW system supported by
the EWAISF. Two of the larger users of the system are the Strategic Air
Command (SAC) and the Tactical Air Command (TAC). The ALR-46 was
received from the enemy threats and comparing the measured parameters to
change. Some of the reasons that can cause a user to request a change
threats, new and better techniques for detecting the threats are
2
formed. The ALR-46 system has to be modified to install these new
techniques.
must be modified.
request "or modification reaches the top of the queue, the request is
for making whatever changes to the system are required to satisfy the
user's request. After the changes have been installed and tested, the
updated system is forwarded to the user. The final phase of the system
change process such as (1) who requested the change, (2) why was it
needed. (3) what changes to the system were required to implement it,
system.
3
The ALR-46 section is maintaining their system on a 10-15 year old
Integrated Support Station CISS). Figure 1 depicts the current ISS that
ALR-46 system.
simulator.
threat environment.
the current ISS, combined with its limited capability, forced the EWAISF
4
I I ENEMY I FLIGHT II
II THREAT ------ ->1 PROCESSOR II
I I ~SIMULATORII I
- - --- --
ICRT I FLOPPYI
DISKI CRTI
II I I I I I
S I AT.SS I----------I PDP 11/70 I-----------I
AISS I I
II I I I I II
I I
I AISS II
I I
to replace the current ALR-46 ISS's with four advanced ISS's (Ref figure
2.). Each Advanced ISS (AISS) is equiped with a stand-alone PDP 11/34
6
AISS's will have access to a common data base located on the PDP 11/70
(Ref figure 3.). The PDP 11/70 will perform tasks either too large or
too time-consuming for the PDP 11/34's. The first AISS and the PDP
~Pzoblem
reporting the results of the analysis to the user severely limits the
(hardware monitor)
programs
Even though the above capabilities will assist the test engineer when
7
would be monitored to determine which threats it recognized. The list
recognized by the flight processor. The system could generate. for the
test engineer. a list which contained (1) the threats that were
*j simulated. (2) the threats that were recognized, and (3) the threats
that should have been displayed. The magnitude of this test system is
flaws have been the topic of many discusions at the EWAISF. The threat
parameter tolerances that would be used to define whether the system had
advanced threat simulator was 1000.6 and the ALR-46 system measured the
tolerance questions are resolved, this portion of the test system can
not be completed.
order by the OFP, the~ information provided by the hardware monitor may
analyzing the data taken from the ALR-46's memory will be presented to
8
the operator in two forms: (1) a color reproduction of the pilot's
distinguish between two or more threats of the same type, when being
ALR-46 system has acquired on each enemy threat. The completed system
The VAX-l1/780. Tektronix 4027 CRT. and the DEC VT-100 are
these systems comes from the vendor supplied manuals. For the
manuals (Refs 2 and 3), and DEC's VAX-11/780 book (Ref 4). The
8:279) was selected for the analysis and design of the graphics system.
A top down strategy allowed the design to first address those levels
closest to the user and thereby insure that the design was consistent
with the user's requirements. Each lower level r-veals more and more
9
T
details about the system. Data Flow Diagrams (DFD's) were used as an
AFIT Theses, Avionics System Division (ASD), Avionics Labs, and the
were used to help derive the system requirements for the ALR-46 Computer
specification into module structure charts. The final phase of the CGS
10
Thesin Develonment
The development of this thesis followed the approach that was taken
Chapter II. This chapter translated the results of the user survey into
in more detail along with the selection of the CGS language. Appendices
Structured Analysis (Ref 8). The data flow diagrams produced with
D.
source code listings are in Appendix E while Appendix F contains the CGS
12
II. ALR-&6 CGS Funtional Requirements and System Configuration
Introduction
described in this chapter. The results of the user survey are described
from the results of the survey. In the next section, the requirements
Chapter III.
User Survey
insure that the system produced would meet the primary goal of the
EWAISF, which was to reduce the time required to modify the ALR-46
section chief. The survey was divided into three major sections.
modification to the ALR-46 was the most time consuming. All of the
users overwhelmingly agreed that the test/debug phase was the most time
consuming.
13
In the second section, the users were asked to describe from a
the users are described in the next section. The users were unable to
However, all of the users did agree that the parameter display
The user survey results and the author's experience were used to
not lag the actual pilot's RWR display by more than two second). If
SI I I I I I I
I AISS I--->1 Hardware Monitor I-...>I Computer I---->I Display Device I
I I I I I I I
14
Table 1. Critical Emitter Track File Entries
1. SYMBOL 4
2. TYPE 4
3. BANDS 5
4. PRI OR FRAME PERIOD 6
5. PULSE TRAIN DESCRIPTOR 4
6. FRI AVERAGE 5
7. DEVIATION 5
8. SPECIAL 2
9. POWER 1
i10. POWER ROUND 1
I. HIGH BAND SINE 3
12. HIGH BAND COSINE 3
13. CEPC 1
14. AGE COUNT 2
15. C/D 2
16. PRIORITY 2
17. PRIORITY POWER 1
18. PRIORITY POWER ROUND 1
19. AZIMUTH 3
20. LETHALITY RING 3
21. M.L. AGE 1
22. RECORD NUMBER 2
---------------------------------------------------------
I I I I I I I
I---- >1 Display Device I
I AISS I--->1 Hard-4are Monitor
I I I I--.. >1i Computer
i I
15
experienced- mode of operation. The "beginner- mode uses very
that help to keep the experienced user from becoming bored during
That is. the system should not abort if the user makes a mistake, it
at the present time, and (d) A help command should exist at each
specifically the PDP 11/34 and the PDP 11/70. The EWAISF defined
1
16
the results of the test being performed would be biased.
in order to minimize the cost of the CGS. One of the two color
was needed by comparing the requirements and the available hardware (Ref
figure 4). This made it apparent that a PDP 11/34 computer, a hardware
monitor, and a DEC VT100 CRT, all of which are already in each AISS,
combined with the Tektronix 4027 CRT, would satisfy all of the CGS
allow the screen to be divided into regions. The PDP 11/70 was
17
AVAILABLE HARDWARE
REQUIREMENTS IPDP-11/70IPDP-11/341VT-100lCbromaticsiTektronix
I I I I 5001 1 4027
------------ I-------------------------------------------
I I I II
RWR Display I I X I I I X
Parameter Display I I X I X I I X
I I I
Operational Environmenti I X I X I I X
III II
Application Environment X XI I X I X I X
I I I II
I AVAILABLE HARDWARE
-------------------------------------------
CONTRAINTS IPDP-1l/701PDP-11/341VT-100ChromaticsITektronix
I I I 5001 I 4027
------------ I-------------------------------------------
I I I II
Compatibility I X I X I
I I I
Operational EnvironmentI X I X I X I x I X
I I I I I
Programing Language X I X I X I I X
II I II
I I I I I
eliminated as a p,tential host for CGS because it did not satisfy the
real time constraints of the first two requirements (RWR Display and
18
acquired by the hardware monitor from the PDP 11/34 to the PDP 11/70
would cause an excessive time delay between the ALR-46 display and the
from (Ref 5). the operator will not have a problem distinguishing
expenditures or long lead times since the sponsor already owned it.
The hardware monitor will be used to acquire the data from the
ALR-46. and the PDP 11/34 will be used to host the software needed
the critical parameters (Ref Table 1) the operator needs during the
the AISS. The hardware monitor will be used to acquire data from
the ALR-46, and the PDP 11/34 will be used to host the software
19
3. Operator Interface. Since satisfying the requirements of the
operator interface dealt mostly with the design of the CGS software
host the CGS, easily satisfies this requirement, except when two
VTl00's to host the CGS easily satisfy this requirement, since these
part of the ALR-46 AISS. The Tektronix 4027 CRT is also fully
compatible with DEC 's PDP-11 and VAX family of computers (Ref 5).
20
I
hardware monitor, threat simulator. PDP 11/34. PDP 11/70, and VAX-11/780
three computers have in common. This section will not only provide the
reader with a clearer understanding of CGS, but will also emphasize the
idea of the magnitude of the problem the test engineer is faced with in
validating the system after a modification has been made. But for a
threats can be divided into classes or types. The ALR-46 uses the
below:
threat.
transmitted.
21
C. Pulse Repetition Interval (PRI) -- the time between pulses.
When the energy transmitted by the threat strikes the plane, a small
received. The enemy threat analyzes the energy reflected back from the
plane (target) to determine the distance between the threat and the
aircraft (range), the direction ol the aircraft (azimuth), altitude.
speed, etc. The ALR-46 system on the plane also receives the RF energy
(AID's). The four receivers perform two major functions. First and
foremost, they received a portion of the RF energy transmitted by the
enemy threat. Because they are located at different points on the plane
(normally one on each wing tip. one on the front and one on the tail of
the plane), they can be used by the ALR-46 system to define the
direction of the threat (azimuth) relative to the heading of the
aircraft.
22
A pulse of RF energy is received simultaneously at each of the four
receivers. The time the pulse arrived is recorded, the power level of
the signal at each receiver is also measured and recorded. and the
flight processor.
data returned from the front end, and displaying, to the pilot, the
list of parameter values for each threat the AI.R-46 system is able
to recognize.
derived about each threat (PRI. scan, etc.). The list is sorted by
23
calculate PRI. scan, etc. When the algorithm calculates a threat
(Ref figure 5). The center of the display represents the aircraft's
position.
is being made. The pilot's display is the only means the test engineer
the EWAISF feel that after a modification has been made, the time
required to test the ALR-46 system can be reduced through the use of a
file (Ref Table 1) were available in realtime (no more than two seconds
DEC M1100 CRT. The MOO0 CRT serves as an input device for
operator commands to the computer and as an output device for data sent
maintenance test are not necessary because the VTI00 has built in
diagnostics. Each time the VT100 is turned on, the advanced video
24
L6_ _ __
A
II
II
I ~I
I Direction
of Plane
Note: Each symbol displayed more than once is assigned a unique color.
Unlike most terminals, the VTl00 does not use switches or jumpers to
Instead, the VTl00 uses a nonvolatile memory which always remembers what
25
controlled are autorepeat, light or dark background, margin bell.
lines of 132 characters each. The VT100 can highlight any character(s)
1. Cursor Position Report (CPR) - The CPR command reports the active
2. Cursor Backward (CUB) - The CUB command moves the sursor to the left
the number of spaces requested.
3. Cursor Down (CUD) - The CUD command moves the cursor downward the
4. Cursor Forward (CUF) - The CUF command moves the cursor to the right
5. Cursor Position (CUP) - The CUP command moves the cursor to the
cursor.
6. Cursor Up (CUU) - The CUU command moves the cursor up the number of
26
7. Double Height Line (DECDHL) - The DECDHL command allows the user to
8. Double Width Line (DECDWL) - The DECDWL command allows the user to
9. Set Top and Bottom Margins (DECSTBM) - The DECSTBM command is used
to set the top and bottom margins which define the scrolling region.
Part of the screen can remain stable while the remainder of the
Tektronix 4027 Color Granhics CRT. The 4027 belongs to the class
4027 is used to carry communications between the operator and the host
27
displays in up to 64 different colors. The 4027 consist of a display
unit and a keyboard attached to the display unit by a thin cable. The
of 80 column text. The 4027 display memory can be divided into two
area for creating color graphics, editing text files. filling out forms.
Each time the 4027 is turned on, all of its memory is checked by
rate, left margin, right margin, tab stops, parity, etc., can be set
from the keyboard or from the host computer. The 4027 has a large host
I. Jump Command - This command positions the cursor to the row and
specified.
3. Right Command - This command moves the cursor to the right the
4. Left Command - This command moves the cursor to the left the number
of columns specified.
28
subsequent graphics.
9. Vector Command (VEC) - The VEC command is used to draw line segments
10. Relative Vector Command (RVE) - The RVE command is used to draw
11. Polygon command (POL) - The POL command is used to draw a large
12. String Command (STR) - The STR command is used to write text into
graphic region.
14. Wo ':space Command (WOR) - The WOR command is used to define the size
29
Table 2. Address Limits Table
I Lower Limit 1 1
--- -- -- -- -- -- --
I Upper Limit 1 I
---------------------
I Lower Limit 2
--- -- -- -- -- -- --
I Upper Limit 2
---------------------- I
-------------
-I - - - -
I Upper Limit n
other task. The only problem encountered with the 4027 is that it
failed three times in a four month period. Tektronix has assured the
between the ALR-46 and the PDP 11/34. The monitor is used to extract
30
data from the ALR-46 in real time (within a few microseconds of when it
actually occured) and transfer it to the PDP 11/34 without affecting the
monitor is stored in the 1M's 2048 word internal storage buffer until
the monitor can gain control of the PDP 11/34's unibus (unibus is
described below). When access has been gained to the unibus, the data
can be transfered into the PDP 11/34's memory without the aid of the PDP
called "cycle stealing- because the RM steals cycles from the CPU (Ref
4:224). The hardware monitor has two modes of operation. In the first
monitored, are defined by the user. Each time an address, that falls
into one of the address limits, is written to. the address and its
soon as there is time, the monitor transfers the data in the storage
buffer to the PDP 11/34 (Ref figure 6). In the second mode, a series of
event addresses (Ref Table 3), that are to be monitored, are defined by
pointer to the specific part of the OFP being executed. Each time the
contents of the program counter matches one of the entries in the event
address table (Ref Table 3), the contents of the OFP's program counter
and the contents of the real time clock (two words) are temporary saved
in the monitor storage buffer (Ref 13:4-40). The value -177777- is used
31
III I PDP 11/34 I
IALR-46 I HARDWARE MONITOR
-----------------------------------------------------I
Data Bus
---------X---
II I_ _I_
------------------>1 Data I -
III-----II Ii
I Address I-----....>1 UNIBUS I
IIIIII
I I PI
I I IComparel I
I Address --- I--- > With I I
Bus I IAddressl I
i---------X I Limits I---------
I Table I
I I I
-------------I-----
----------------------------------------------------
Figure 6. Data Capture With the Hardware Monitor
as a marker to distinguish between the PC and time (Ref fig 7). As soon
affecting the operation of the ALR-46 in any way. The HM's internal
storage buffer would look similar to table 4 if both modes were engaged
32
Table 3 Event Address Table
I Program Counter 1
---------------------- I
I Program Counter 2
---------------------- I
I Program Counter 3 I
---------------------- I
-- - - - - - - - - - -
-------------
I Program Counter n
enPrgrarCouternt.
33
I I
ALR-46 I HARDWARE MONITOR I PDP 11/34
III
------------------------------------------------------ I
Address
Bus
----- X--- I
I I PC I
I II--- I I
I II I 177777 I I I
I I------- ---- I-- > UNIBUS I I
I ... •Timel 0I[I II
-i-------- I ---- I
I I I ITime1 I
I II
--- I--->1 Compare I
Read I IWith I I
Enable I I Address I I
------------- >1 Limits I I
I Table I I
I Real-Time I I
I Clock I
------------------------------------------------------
Figure 7. Event Capture With the Hardware Monitor
reflected in the software and in the peripheral options (Ref 9:1). For
example, the VTIOO terminal is compatible with the PDP 11/34, PDP 11/70,
compatible with the PDP 11/34 and the PDP 11/70. The compatibility of
34
Table 4. Hardware Monitor Internal Storage Buffer
I Data
Ram Address
--------------------- I
I Data
I---- -- -- -- -- --
I Ram AddressI
-------------------- I
I PCI
--- -- -- -- -- -- --
I 177777I
----------------------I
ITime 0I
--- -- -- -- -- -- --
ITimelI
----------------------I
-------- - - -
----------------------I
I Data
--- -- -- -- -- -- --
Ram Address
comwion: they all process data on a data bus called the '*Unibus**. The
35
---
Microcomputers Minicomputers Medium-scale High
for Multi-task Computers Performance
and Dedicated Wide-word
Applications
UPWARD COMPATIBLE
>
-----------------------------------------------
relationship. During any bus operation, the bus master controls the bus
when communicating with another device on the bus. When two or more
decide among them. The bus is always given to the requesting device
36
I
I -
II I BU
USiBUS I
II I I
II I I
I I V I
Figure 9.
Another feature that the PDP 11/34 and PDP 11/70 have in common is
RSX-X1M makes it transparent to the user whether the PDP 11/34 or the
response time and also satisfy the critical time response real-time
37
Another feature in common between the PDP 11/34 and the PDP 11/70
program executed on the PDP 11/34 and 11/70 processors with memory
the virtual address space to physical memory (Ref 9:147). The memory
management system on the PDP 11/34 can map a 32 K program into any of
the 124 K words of main memory. The memory management system on the PDP
memory address space and provides protection and relocation features for
mult2.user applications.
signals for the addition of hardware floating point and cache memory
options (Ref 9:181). The features common to all PDP 11/34 processors
are (Ref 9)
control from any ASCII terminal without the need for the
38
3. Automatic bootstrap loader
5. Memory management
The options available for the PDP 11/34 processor are (Ref 9)
million words of memory (Ref 9:277). The cache contains 1024 words of
39
I I
S II I PDP 11/34 Processor with 128 Kwords of Memory and RSX-I1M OIS I
II I
!I I
•-v v v
II ------------------------------------
I I I I IIi
I RL-01 I ILA120 Decwriterl I TJE 16 1 1
I I 2.5 Mega-vord Disk I I Terminal I 19 Track Magtapel I
I II I I I II
I---------------- -----------------
I PDP 11/130-bc I
I VT100 CRT with I
I Cassette Tape with I
I Memory I
II
40
- I
I PDP 11/70 Processor with 128 Kwords of Memory and RSX-11M O/S I
IIIIIi
IiI I I
v V V
III -------------------------------------
I I I I II
I RWP06 I I ILA-36 Decwriterl I I TWE 16 1
1 188 Mega-wordl I I Terminal I I 19 Track Magtapel I
I I Disk I I I I 1 1 1600 BPI I
------ - I I I-------------
v v
I LP-I1 I 4 VT100 I
I Line Printer I I Terminals I
virtual operating system. The 32 bit word size allows the VAX to have
10:255). Even though the VAX is much larger than the PDP-11 processors
in both size and capacity, it still has the PDP-ll's same basic
structure, consisting of the high speed memory, the CPU, and the I/0
system(Ref 10:5). The VAX does not support the RSX-11M operating system
directly, but it does provide a "compatiblily mode- which allow the VAX
modifications. DEC has made it very easy to develop programs on the VAX
41
IVAX-11/780 Processor with 768 Kwords of Memory and VMS ver 2.3 0/SI I
I I I
v v v
I I I I I I
I ILA120 Decwriterl 17 VTlOO CRT'sl 12 RK07 Disk DrivesI I
I I I I I I I
I I
system were described. The major components in the system are: the
ALR-46, the VT100 CRT, the Tektronix 4027 CRT. the hardware monitor, the
threat simulator, the PDP 11/34, the PDP 11/70, and the VAX-1l/780.
42
The constaints imposed by the sponsor on CGS hardware compatibility
and availibility did limit the hardware that could be used in CGS. Even
I
III. Software RPguirements
Introduction
between the user and CGS, as well as the output capabilities of CGS.
the communications link between the user and CGS. The requirements of
both the Parameter and the RWR modes of operation are discussed.
Software Overview
The CGS can be divided into three major categories :(1) Operator
Interface. (2) Processing. and (3) Output. As shown in Figure 13, the
interface and output). The operator interface provides the user with a
means of communicating with CGS. The user can request help or request
interface and the output processes used the same device, they are
44
A -- - - - - - -- - - - - - - --- --
--
I \ I I I I I I I
I \---- >I OPERATOR I-...>! I---->> I
I \ I I I PROCESSING I OUTPUT!!
/ USER \<-...I INTERFACE I<.<-... I
1/ \ I I I I I II
I--------------------------------------------------------------I
request. For example, when the user request the RWR mode, the operator
function. The processing function generates the display data and passes
The user is concerned only with whether or not the display data was
generated, not with how the processing function generated the display
For example, if an error occurs in the processing phase, the user would
Operator Interface
understand what their users want them to do and then in turn, are unable
45
interactive computer systems respond only to commands phrased with total
specifically for that system (Ref 12). If the user fails to use this
users.
references people often use for economy of phrasing (Ref 12:19). Again,
popping back to the original one (Ref 12,15). A user who enters an
seek help and then reenter the entire command. The error may have been
very unforgiving! The operator may have several errors in the command,
and yet the interface forces each error to be resolved one at a time,
46
The operator is not only forced to reenter the command several times,
but is also prone to making new errors while trying to correct the old
problem encountered in the current mode, the state of the current mode
this way, the operator is only required to reenter the command when it
syntax and spelling and frequently do not say exactly what they
47
2. Robust communication. A graceful system must be able to let its
able to negotiate with the user when the descriptions turn out to be
description occured.
user to break off one command, execute another, and go back to the
48
5. Natural output. A graceful interface should be able to produce
user. Static explanations relate to what the system can and cannot
do in a general sense, and how the user can ask the system to do a
accordingly.
such as Alto, Perq. Lisp (Ref 12) and Small Talk (Ref 15) prove it can
be done. One of the main reasons that many current systems perform so
much effort on the user interface. The sponsor (Robins AFB) of this
thesis feels the same as most system developers. The sponsor chose to
49
operational software. The trade-off between a sophisticated operator
and operational software was necessary because the limited time allowed
taken several months to design and implement, which is more time than is
of the operator interface is to provide the user with the Parameter and
Parameter Capability
users with a means of monitoring the critical, OFP track file parameters
(Ref Table 2).* without affecting the operation of the ALR-46 system.
The functions required to provide the user with this capability are
described below:
the display and the same is true for the parameter output. The
50
BY PRIORITY Threat I Data . . . .. . Threat 16 Data
SYMBOL : :
TYPE :
BANDS I I
PRI / FRAME PERIOD I :
PULSE TRAIN DESCRIPTION I
PRI AVERAGE : :
DEVIATION I
SPECIAL
POWER /PWR ROUND I I
HIGH BAND SINE I I
HIGH BAND COSINE : :
CEPC I :
HI BAND AGE COUNT : :
CD BANDAGE COUNT I I
PRIORITY : :
PRIORITY / ROUND : I
AZIMUTH..
LETHALITY RING I I
ML AGE : :
RECORD NUMBER Threat I Data . . . . . . Threat 16 Data
--------------------------------------------------------------- I
OPERATOR / COMPUTER DIALOGUE REGION
the data to CGS. CGS decodes the word and updates the critical
51
parameters to be displayed can be found in Appendix A. Another
RWR Cagability
range and azimuth data. The functions required to provide the user with
kept in a dedicated area of the display and the same is true for the
2. During the RWR sequence, parts of the pilot's display (Ref figure
15) are static, which means it only has to be drawn once. The
(a) Range rings. The display has three concentric circles (rings)
sixty miles, the next ring would represent forty, etc. A small
52
Dieto I
of Pln
-- - - - - - - - -- - - - - - - - -- - - - - - - - -- - - - - - - - -
Fiur 15 ttcAI4 ipa
Fu
counter-clockwise~~
directio. hahmrs trt on th
53
for approximately one-half inch. The hash marks are positioned
3. The RWR mode user's display (Ref figure 16) must be generated and
display messages from the computer and to enter user commands to the
When the treat is no longer active, its symbol is removed from the
section.
54
IEMITTER NUMBER SYMBOL RANGE AZIMUTH
I SA2 20 310
2 AAA 50 48
"I: :I ALR-46 Pilot's Display
I . I
I : * :
--------------------------------------------------------------- I
ALR-46 CGS>
(OFP) emitter track file will help the reader understand what is
55
required to generate the data needed to drive the Parameter and RWR
modes user's display. Actually, the emitter track file is not a file.
but a buffer within the OFP. The OFP, which resides in the memory of
points to itself, it means no emitters are active. The track files are
shown in Figure 17. the records in the track file form two linked lists,
the next highest priority threat. etc.. until the lowest priority threat
record, the first available record points to the next available record,
etc., until the last available record is reached. The last available
56
Address Operational Flight Program
------------------------
i I - I-
<----------------
* I FirstEmitter I------------
SI I
SI I I
I I: I
:I II
-- -- -- - :
-------------------------------- I
I I
. I
I---------------------------------
: I
I I
--------------------------------I
57
record has to be removed from the "BlueLinkList" and inserted into the
"'Red_Link_List". As the ALR-46 system collects more information
about a
threat (PRI, PW. etc.), the OFP updates the appropriate vord(s) in the
record associated with that threat. Each time a word in the emitter
track file is updated, the hardware monitor stores the contents and the
address of the updated word. The information needed to drive the RWR
and Parameter displays must be extracted from the data (Ref Table 4)
taken from the ALR-46 Flight Processor by the hardware monitor. The
Each record will contain four thousand . sixteen bit words. As shown in
table 4. the hardware monitor data will be either time data (in groups
of four words) or threat data (in groups of two words). The definition
only as good as the programs that drive the display. The integrity of
the programs that drive the display are heavily influenced by the
language they are written in, which brings us to the topic of the next
section.
58
government today is the high cost of maintaining software. This
easier to maintain.
2. Unlike FORTRAN. Pascal does not limit the variable names to six or
4.' Pascal supports linked list (Ref 2). Using linked lists with
function.
The only advantage of FORTRAN over Pascal is the fact that more of the
59
1. The operator interface must be friendly. clear. and forgiving. It
must lead the inexperienced user -by the hand- with descriptive
necessary.
performed:
(c) The data taken from the OFP by the hardware monitor have to be--
decoded.
Cc) The data taken from the OFP by the hardware monitor must be
decoded.
Cd) The dynamic regions of the RWR display must be created and
maintained.
60
TV. Design of Computer Graphics Syatem
Analysis techniques (Ref 17) were used in the final phase of the design
Losical Model
Chapter III. further analysis could prevent errors from being designed
into CGS. Several techniques were available for this task including
technique.
61
I Data Flow Data Flow
-----------------------------------------------------
Figure 18. DFD Components
the four components shown in Figure 18. The first component is the data
flow, a **pipeline- of other data flows and of data elements. The data
elements are basic data types that can not be partitioned further and
still retain their meaning. For excample. the data element might be an
DFD's. The process converts input data flows to output flows and is the
contains the process name. The box represents the third component of
62
Table 5. DFD Index
PAGE
DFD's, the sources and sinks of information. They may represent a user
enters or leaves the system. Finally, files are the last component and
are repositories of information within the system. They are shown by
straight lines. The DFD's are layered, starting with a context diagram
that defines the interface of the system with its environment. Then the
processes in the diagram are expanded into lower level DFDts. This
63
HardwareMonitor-Data Threat-Symbo lType
-------------------- ----------------------------
I
IData Flow Data Flow I\
NaeNameI
- ,I
I User Execute User I
[iKeyboardI CGS Display II
Finally, it was fairly easy to transition from the DFD's in the logical
model (Ref Table 5) to the module structure charts (Ref 17) used in the
physical model.
everything from the user input at the keyboard to the response the user
requirements for CGS into a logical model as shown in Figure 20. First,
the user command must be examined to determine the type of user request
64
HardwareMonitor.Data
--- - - - - - - - -
ThreatSymbol-Type I
---------- -----------------
Display
Critical Track
File
~Critical-
Rquest
Help-
Information
process to display the critcal track file parameters (process 2). Both
the hardware monitor data file and threat symbol type file must be
65
U i
is an RWR command, CGS must activate the process to simulate the pilot's
display (process 3). Again, both the hardware monitor data and the
threat symbol type files must be accessed by the process to generate the
RWR data. If the user command is a request for help, the appropriate
help information must be output to the user (process 4). Finally, the
response output from one of the three processes must be transmitted back
process was specified in more detail by the lower level DFD shown in
Figure 21. First, a block of data (4000 words) must be read from the
hardware monitor data files. The CGS must then extract an emitter track
file data word from the block of data (process 2.1). Next, CGS must
update its threat data base (process 2.2). In the final step, CGS must
extract the updated parameters from the treat data base and prepare them
Update CGS's Track File Entry. The update track file entry
process may be specified further by the lower level DFD shown in Figure
(process 2.2.1). This can be done using the address of the data words
(Ref figure 17). After the threat has been identified. CGS must
identify which of the sixteen possible word (Ref Appendix B) has been
several critical parameters can be affected when only one track file
word is changed.
66
a 4J
'. )
IIC
U 04.
a ai
0 14 w5.A
* d H I:
a~4 -4 "-
I~C i4 -4.
a 4 - 41J z
p 0 ra
a 0
a ao -4
cc I a ca
I aa
a i IaCG ~ a L
ac W.4 I 0
a a I
4.1 aV
a 0£ Li ao
a Wa 0o I
- - - - - - - - - - - -a-- -
aa ~ *4'a a7
a1 1w m
a- -ii w I
a0 CO4
2: z
I
C0La-4
4a -,
0)
CO 4
0 1 wZ 1
a I IV
In I a1 4
wI A
ct I J
a 0
a oIa o
0 in
68
10
I I
I~a c'0o
AI 9 A
a ca
I V
~4 P
c4~
$ ~~ 4co'%
10 (13 r.
I -4
cI -
0 Q0
=1 I
69N
Simulate Pilot's Disniny.. The simulate pilot's display process
was specified in more detail by the DFD shown in Figure 23. First, a
block of data (4000 words) must be read from the hardware monitor data
file. The CGS must then extract an emitter track file data word from
the block of data (process 3.1). Next, CGS must update its threat data
base (process 3.2). (Both the extract data word (process 3.1) and the
processes 1.1 and 2.2 shown in Figure 21.) Finally, CGS must extract the
updated parameters from the threat data base and prepare them for output
Extract / Format RWR Data. The extract / format RWR data process
was specified in more detail by the DFD shown in Figure 24. First, the
Next. the symbol must be removed from its current position on the
display and displayed in its new position (process 3.3.2). The critical
The threat's symbol. range, and azimuth are displayed alongside the
the lower level DFD shown in Figure 25. The help request must be
70
I 0 C\C
CL~0
O.- \ .
too .1 -4 W
0 -- r. 4
wa I m- 0 I
0 -
V3 0 0
. QI
•, / I
j '-4 1 c
* 44 0 w 4f
I3 Q 0 C IA. c
\ lO .I.J
00a
r. w0
0 Aj -T
A In
0 -
(a 71 cnA
Menu-
Selection I
Generalp e elp u
Request
/ RWRDisplay_ [
IRequest DeterminePrvd
I the Type Help Procedure fo
IInformation RWR Display
Parmetr-Parameter-1.
....Display -
Request 4.4 ProcedureI
available commands and their formats must be output along with the
formats of the more specific help requests (process 4.2). If the help
the RWR procedure must be output (process 4.3). Finally, if the help
72
The next phase in the design was to translate the logical model of
section.
Physical Model
modules. The first set of modules gets data from the source. The data
is transformed into the output by the second set, and the third set
outputs the data to the sink. To partition the DFD into the three sets
section. and an efferent branch. This is done by tracing the input from
an input. Likewise, the output is traced backwards from the sink to the
flows then are used as the boundaries between the three sections of the
DFD.
afferent module for each data flow and a transform for each process.
This is illustrated in Figure 26. For the second set of modules, the
73
I I
I Get
I I
IC I
CII 1I III
2 B" B \CI
GtI I I
I Get II 1 I
I A I I II
II I II
(a) (b)
in Figure 27. The structure for the last set of modules is designed
transform module that relates the two data flows specified by the
74
FI Transform [
Cto F
C I
E
CE
C I 3 i I 4i I I 5 I
(a) (b)
I Put I
F 1 ? IF
(a) 66 Put u
(b) i
G I F
6 Put ut
75Pu
SimulateII
I I ~Pilot's I
I I Display I
Data_Word !WR_.DataI
I ~Data..ord f tUpdated-.
I Hardware- Parameter_. Updated_.
Moitr Threat-. Data Parameter..
DaaSmo-Data I
AIllI
I I
EE E --
2 1
(aBb
A-------------------------
Fiue30 Trnscto AayI Tehi G
E7D
Help-Request I
-- 1 HelpInformation
I I Help.ser I
I iI
Selection Parameter.isplay..
f Procedure
General- RWR.. RWR I
llnformatio-_ Help- Display- Parameter-Help_
IRequest Request Procedure % Request I
------------------------------------------------------------------
Figure 31. Help User Module Structure Chart
This technique was used throughout the module structure design phase.
The other technique used a great deal was transaction analysis (Ref
77
Figure 30(b). The module structure chart for the help-user command is
physical models of CGS. The logical model used data flow diagrms to
These techniques are briefly described and the module structure charts
78
V. Implementation and Testing of CGS
Also, the test plan and procedures employed to verify the CGS modules
and validate the system are described. Finally, the testing results are
st-ted.
Imnlementatioa
and Bottom-up. The Top-down strategy was chosen to implement CGS due to
strategy.
79
A.BC just call stubs
------ at this time
IMAIN
IA I I
80
(Ref figure 32). High-level modules are tested using stubs to simulate
the work of lover-level modules (Ref 8:216). Bottom-up design creates a
low-level modules should be coded and tested first, followed by the next
hie,,er-level until all of the modules have been implemented (Ref figure
33). The lower-level modules are tested using driver programs and
separate phases. in effect, every time a new module (or small group
test.
lower-level modules.
81
Tested stand-alone
(using drivers)
lx IY I z II
---------------------------------------------------------------
Integrated to form I
---- subsystem Al
IAl I
Integration continues- I
---- Subsystems are combined I
IMAIN I in larger collections I
- to formcomplete a systemI
82
3. Users can see a working demonstration of a skeleton version of the
system long before the entire system has been completed, thereby
the newly added code or in the interface between the new code and
later.
7. Requirements for machine time are distributed more evenly and are
83
perhaps halfway through a project and grows slowly as modules are
With the implementation strategy defined, the next step was to transform
The process stops when the last program hierarchial level defines
readily identifiable.
the software.
the ease with which a Warnier-Orr design can be implemented. The format
84
AKA11 252
7
6 AIR FORCE INST
OF TECH WRIGHT-PATTERSON
OEC 81 AFB OH
.j WTHAMES SCHOO-ETC
9/
C/6
E2,3hhE~h
UNCLASSIFIED AFIT/GCS/EE/81OLG N
Ehhhhhmmhi
P121
(0.1)
P12 < +
Ii (1)
P122
(0.1)
P13
(l.n)
-----------------------------------------------------
Figure 34. Warnier-Orr Process Structure Diagram
85
Table 6. List of all Warnier-Orr Diagrams
---------------------------
I-------------------------------
ALR46CGS
OPERATOR-INTERFACE
HELP
PARAMETER
CREATE_TRACKFILEENTRIES
INITIALIZE_TRACKFILEENTRY
READ_SYMBOLTYPEFILE
SETSTATEOF_VTl0O
POSITIONCURSOR
GENERATEFORM
UPDATE_TRACK_FILEENTRY
PROCESS_ONEWORD
SHIFT
ALR46-DEGREES
OUTPUT_.CRITICALPARAMETERS
POSTION_CURSOR
RWR.DISPLAY
CREATE_.TRACK FILEENTRIES
INITIALIZE_TRACKFILEENTRY
READSYMBOLTYPEFILE
INITIALIZEPOSITION
SET_STATE_OF_4027
UPDATETRACK_FILEENTRY
PROCESS_ONEWORD
SHIFT
ALR46-DEGREES
OUTPUTTORWRDISPLAY
DRIVEPILOTS_DISPLAY I
OUTPUT_A_SYMBOL
SENDCRITICALPARAMETERS
GETNEXTCOLOR
X-COORDINATE
Y-COORDINATE
-------------------------------------
86
but not both, are executed each time P12 is executed (decision). The
notations on P11 and P13 in parenthesis indicate how many times that
module is repeated each time the parent module, P1,'is executed. In the
case of Pll and P13. the modules will be executed from one to "m- and
once.
Figure 35.
were to make it easy to use and to provide the operator with help upon
request.
The user has the option of entering either the full keywords for
the commands or only the first letter of the keywords. This keeps a
regular user of the system from being hampered by long commands, yet
keeps the novice or infrequent user from having to cope with cryptic
87
-- - - - - - - - - - - - - - - - - - - - - --- - - - - - - - - - - -
Ge a omnI prao-nefc
I I ProcessI
I I Operator I
IALR46CGS < Commands
I(1,terminate) I
I I Parameter~jnode < Parameter
88
Table 7. Valid Keywords
1. R]EP
2. RWR DISPLAY
3. ZARAMETER DISPLAY
The user -help- protocol was implemented and can provide the user
the display was thoroughly studied before the linked list was chosen.
The linked list offered fast access to each critical parameter and was
the same structure used in the ALR-46 OFP. The linked list also allowed
the number of track file entries to vary with the number of active
threats and would on the average require less storage space than the
array. On the other hand, the array offered direct access to key
parameters and was simpler to implement. Even though the linked list
was more difficult to implement, it was easier for the ALR-46 personnel
to maintain because it was the same as the structure used in the OFP.
89
The requirement for ease of maintenance made the linked list more
attractive.
was made to continue the practices employed during the requirements and
possible from other modules. One example of this was in the RWR symbol
display module. This module was passed the symbol and its location on
the display. Thus, the subordinate modules did not require any
knowledge of the actual threat the symbol represented. The last phase
Care was taken to insure changes made in this phase did not destroy the
the modules were free of compilation errors, they were tested using
section.
Testing
A top-down approach was used to test CGS. Each module was tested
before another module was integrated into CGS. Therefore, any problems
90
I I
I I
Initialize symbol-type records < READSYMBOL_TYPE_FILE
UPDAT _ TRACK_
F TLE_ENTRIES
91
Define background color and maximum RWR range
I I I
Initialize thrLat position records< INITIALIZE.POSTION
I I I
II
Initialize symbol-type records < READ_SYMBOL_TYPE_FILE
II
I w I
IRWR.. I
DISPLAY < Set the state of the 4027 < SET_STATE_OF_4027
UPDATETRACK_
FILEENTRIES
------------------------------------------------------
92
specifications. while white-box testing allows test data to be derived
into CGS. Inputs were chosen to insure that all segments of code were
executed. Also, when a branch depended upon a compound logical
expression. inputs were chosen for each of the possible combinations.
used. This procedure entailed partitioning the input domain of CGS into
of any other value. For example, the azimuth parameter has a legal
range from zero to two hundred and fifty nine. The legal values were
divided into sixteen equal subranges starting with zero. Since any
azimuth value from a specific subrange was the same as any other value
from that subrange, only four values were needed to perform this type
test.
also used to test the modules. The values at the borders of the
This parameter has a legal range of zero to seven. To test the behavior
of the module that decoded the stagger level, stagger level values of
93
The testing was done incrementally. As a module was coded and
debugged. it was then integrated into the set of modules that had
already been tested. This new set of modules was then rigorously tested
until the test of the last module was actually a test of the complete
CGS. This method worked well and allowed interface problems between
modules to be isolated quickly. Finally, records were kept of these
results, a modification to CGS can be verified using the same input data
The Computer Graphics System was implemented on the VAX 11/780, but
care was taken to ensure its compatibility with the PDP 11/34 by only
using Pascal statements that were compatiable with both the VAX 11/780
and the PDP 11/34. The operator interface was implemented to accomodate
both the novice and expert user. The RWR and Parameter modes were
analysis.
94
Vi. Conglusions and Recommendations
requirements.
the CGS system requirements. This portion of the investigation was very
The most difficulty was encountered in controlling the DEC VT-100 CRT
and the Tektronix 4027 CRT. Many of the specialized comands used had
it was used.
testing. and boundary value analysis. The CGS modules were tested
95
In summary, through the user interviews, Structured Analysis
techniques, Structured Design techniques, and top-down design
Tests performed with CGS on AFIT's VAX 11/780 using simulated data
indicated CGS will be a valuable test tool for the ALR-46 personnel.
The sponsor felt that CGS did meet the objective of the investigation,
which was to reduce the time required to modify the ALR-46 system. CGS
Recommendations
potential of CGS:
allow the large users of CPU time to be identified and thus the
96
2. The response time of CGS could be reduced significantly if DECts
"QIO" system procedure was used for I/0 instead of the standard read
and write statements. Tests on the PDP 11/34 indicated a ten to one
the remainder of the CGS procedures. This would allow the RWR and
control over CGS at any point in time. At the present time, the
operator has to wait for one mode to complete before another mode
can be selected.
97
i .. . . . . . . - . ..
Bibliogra~bla
7. EX-VT100-UG-002. 1 100
Userts Guide. Operator's / Programmer's
User's Guide. Maynard, MA: Digital Equipment Corporation, 1979.
98
r -q
Bibliogrsphy (cont.)
99
....
III
I1|
1II
iJ
11
A P PE ND IX A
file entries used by CGS to generate the Parameter and RWR displays.
Actually, the emitter track file is not a file, but a buffer within the
sixteen records which contain sixteen words each. All records have
Figure 38. Only the bits used by CGS are described. The function of
most of the bits not described is classified. Word zero is used by the
100
I I
Record Number
1. Data Word t0
--------------------------------- I
--------------------------------- I
101
The following is a description of the emitter track file words used
by CGS:
track file form two linked lists, the "Red_LinkList" and the
"Blue_.Link_.List". The Red_LinkList is composed of records of
102
Address Operational Flight Program
I I
5000 1 Pointer to Next Track File Record 1< -----
* I
------------------------ I I
5015 Data Word j15 I
------ ----------------------------------- I
5016 Pointer to Next Track File Record 1< ---- +-- +------
---------------------------------
5031Data Word 15 I I
-------------------------------- I
* I
I
5240 1 Pointer to Next Track File Record .----
+--
----------------------------------
5255 Data Word :tr15
103
Blue_Link_List. It points to the first available record, the
WORD 2: BITS 0 - 15
additional information.
104
WORD 3: BITS 0 - 15
1. Bits 0-15: Either the frame PRI or the average PRI is contained
the frame PRI. otherwise it contains the average PRI. The units
WORD 4: I BITS 8 - 15 I
threat's azimuth. The hi band sine can range from zero to two
WORD 5: BITS 8 - 15 I
threat's azimuth. The hi band cosine can range from zero ta two
105
r
when it is displayed.
106
3. Bit 2: If bit 2 is set, the ALR-46 has identified a threat
contained in bits 0-2. The CEPC has a range from zero to seven.
ALR-46 subtracts one from the stagger level count before storing
eight.
107
4. Bits 11-15: The low band age is contained in bits 11-15. The
1. Bit 5: Bit 5 is the sign bit for the value contained in bits
a positive number.
the same as word 3. except for staggered pulse trains. When the
108
WORD 13: BITS 6 - 15 I IBIT I1I
1. Bits 3-7: The High Band Age Count is contained in bits 3-7. It
109
A PPE9N D IX B
T HE S Y MBOL / TY PE F IL E
It is used by CGS in conjunction with word two of the emitter track file
to determine the threat's symbol and type. The file, which is part of
CGS's input data, must exist prior to running CGS. The file contains
sixty four sequential records. each three words in length. The actual
and a type number for each entry. When the ALR-46 displays a threat, it
alternates between symbol one and symbol two. Symbol one and two are
always the same for threats the ALR'-46 can uniquely identify.
distinguish between them. In this case, symbol one and sn -two will
not not be the same. The pilot will actually see two different symbols
symbol/type file contains entries for all of the threats the ALR-46 can
uniquely identify, as well as entries for all pairs of threats that can
110
OFFSET SYMBOL ONE SYMBOL TWO TYPE NUMBER
-----------------------------------------------------------------
I 0 SAl1 SAl1 100
1 SA 2 SA 2 101
2 SA 3 SA 3 102
3 SA 4 SA 4 103
4 SA 5 SA 5 104
61 AI -A- 161
62 2 BAR SA 4 162
63 AAA -2- 163
not be uniquely identified. Each entry in the file has a unique type
number.
The address in word two of the emitter track file consists of the
base address of the symbol table plus the offset into the symbol table.
The base address of the symbol table must be subtracted from word two
11
A PE N D IX C
C GS RA N GE a nd A ZI MU TH C ALC UL A TIO N
ALR-46 made the process of calculating a threat's range and azimuth very
standard format for negative numbers. The range was easily calculated
using
The calculation the azimuth was more complicated than the range
I' calculation.
system, and it
First, the azim~uth was calculated using ALR-46 coordi.nate
112
!
I
------------------
xI
II 0
I I
190 10
180 0 90 I 270
-+-------------------------------- --------------------
270 I 180
information.
113
AP PENDIX D
needed to specify the design of the software for CGS. These charts were
17).
114
IALR-46
ICOMPUTER
IGRAPHICS
ISYSTEM
Critical- ep
ParameterInomtn
Informato
PCGS- CGS-,i. h~ilot's_ Help-
Status
/Status Display Request
115
CGS-. Critical-
Status IParameter-
IData
1Display
ICritical I
ITrack File I
IParametersI
Parameter-___
I Data_Yord.' Data
1Updated-
Hardware- Data_Word Parameter- UpdatedParameterl
1 Monitor- Data eData
I Data
-- -- -- - -- -- - - -- - ---
I Extract IIUpdate CGS's II Extract I
IIOne Monitor I Track_File_ I and Formatf II
IData Word IIEntry IICritical I
-- - - - - - -- - - -- - - Parameters I I
116
Monitor- I Updated-
Data I Parameter-.
IData
IUpdate CGS's
ITrack File
I EntryI
-- -- - -- -
DCritical_Parameter_I
Emitter_- Data
Number
Updated-
Emter-? Parameter- ~Updated-.
I Monitor Number 0
Data Parameter-
IData DataI
117
--
--
--
--
---
--
--
---
---
----
---
---
--2-
-
ISimulateI
II Pilot's I
I Display I
118
I as a1
-, q) ow.id
a -4'~~ a 04 .4
w a
03 a
a 101 '~.110
I O . a"
00. 4 a1w
P4 c a.
4a CU a
0 a.13 1.4 a4
a 04J a4 a
V Wow aOuIA0>
41 - 1 *41 r4g aI.
cc I V -4 0 93. a1
0.~~~~ ld1Ai r ,4 1c
a a 0
cc a w w.0
E- 04.J I ca 41 cc
a.1 ac cc vb.
a o a 0. CL a 14
0 0~.. w Ai
aa a
a II 0 r4 a
ad0 0.. w
a aC a w Cu -. 4~a
a Io o A.
E- I
- - - - - - - - - -a-- - - - - - - - - - -a-- -
a j4 0 0. a a1a9
Help..Request
IHelp..Information
I I HelpilserI
I Selection ParameterDisplay.
Procedure
120
APPENDIX E
This Appendix contains the CGS Warnier-Orr diagrams and the source
code compiled listings. The W/O diagrams were used to develop the
source code. All of the procedure names referenced in the W/O diagrams
are the same as the procedure names used in the source code. A list is
the CGS procedure names as well as the page number of each procedure's
121
I
W/O Chart Source code
Page Page
122
II
123
. . . . IIIiI iB l ,
---
- - - - - - -- - - - - - - - -- - - - - - - - -- - - - - - - - -
I Prompt User
I Receive a Command
+-I
124
I I
I Provide general help
I I
+
Helpuser <
I 1
I 125
I -
r I
I I
UPDATETRACK_
FILE-ENTRIES
I OUTPUTCRITICAL_
Process Process PARAMETERS
Hardware < One < +
Monitor Word I
I File I(l,last) I
( ,EOF) I _
126
Create a new track file entry
I linked list
I
.. . , . .. . . . I II I II I I - .
127
-- - - - - - - - -- - - - - - - I-
- -- - - - -- -- - - - - - - - -
I I known value
128
II
I I
I I
I I
129
r .. . . . . ...._
SETSTATE_OF_VTIOO <
130
-- - - - - - - - - - - - - - - - - - - - - - - -I-- - - - - - - - - -
IPOSITIONCPURSOR
1GENERATEFORM! <
131
II
POSITION_CURSOR < +
(II
132
I 1
I ALR-46 track file
ALR-46 linked list modified < pointer change is
I in progress
+
I ALR-46 linked I
I list modification < Skip
I complete I
+
133
Decode word number zero
I I
+
Decode word number two
+
Decode word number three
+
Decode word number four
+
Decode word number five
I I
Decode word number twelve
+
Decode word number thirteen
+
Decode word number fourteen
134
I I
I I
SHIFT < Extract the bits requested and
I return them right justified
I I
13
----
I I
136
k .. . .. i , I I I I
I I
Change to ALR-46 track file < Output new priority
I I
+
I I
137
t-
II
Initialize symbol-type records < READ SYMBOL_TYPE_FILE
RWR_
DISPLAY < Set the state of the 4027 < SETSTATEOF_4027
UPDATETRACK_
FILEENTRIES
OUTPUTRWR_
Process Process DISPLAY
Hardware < One < +
Monitor Word I
File (l,last) I
(I.EOF) II II
[ Track file word < Skip
138
1139
Define the operator interface as lines 27-34
I I
140
V
+
I I
Non Active Emitters < Skip
I I
OUTPUTTO_ <
RWR.DISPLAY
141
t I
I I
I I
DRIVEPILOTSDISPLAY <
K"
142
1 I
I Set the color for the next symbol
143
I I
I Send a *blank"
Parameters being deleted < line to the
appropriate entry
SEND-CRITICAL_ < +
PARAHETERS
----------------------------------------------------------------------
144
Restart
Current color greater than seven < the color
sequence
GET_NEXT_COLOR <+
SReturn
Current color greater than seven < the next
higher color
145
T-
I I
XCOORDINATE <
I
I Y_SOORDINATE <
I
I I
II III l l ll I I II I . . I
147
IL!
cu . _n c
ul - C! r I
-o i a Q. a
-e a %A o n L
-A 3a m
a ca co
- a, -
0.~t Li. C .o J, *-
C ", .LI -a cm,
S-j - t- 0I u. : - a, K=.
-o
*. -
>0~
~ I
~cc
. 0."- -Z-
--a ~~~~~. C4
Ili
C4
to)
C, 3-
0A m
0
.
an
'co
C,,~-
wA
oU
TJ1
0n
4A
*-I
~C
cO :; -0 >- -. '- A..0, U.1..-
-. 1 -I
-m a r-. -Z
,,.I GA0 C~ 'I
kA A..
wO u a , x -0
0
~ u
J--=.
06 i
. -C as a, at aj -oj ALOA . cloA
I-A
'-c
~ ~ C
-
mX VO.0
0.
-00I
. Go
a ~ ra
oa
'a -n
~0 - -4
CA
-lc
o-,
: T
_
CA.. <AIJ
-P. - 'm a,. GA **0
nb c(n
0. LM C (a .,. A - toCL?
0o 0. cn A. LxA * A. A n * Oc e . A
C_ '-
(.. - wI0 m.. - a ~I
r I-. C- s~OLn CLo in it a)-
K-1 CO
-m4
(u
-a
we re
OL
0 (j j
ce
C-
amA C4U
I--
to~~~ D .~a
w -. to~~g~g~,
1486
IL c
-c -u L" nI e.- LA_
L- cm a-- ED-
- -- 'le = - jc
Im 6-D Ir cut
Ix wL er U.
.Z~J __j 4c C-) LL 02" C.;
CA '. r(f
L.
=L cU
~~~Q
L
-- L-
I- ~ LLL 'Z
Ic~~ 1 "lc LU
'.L-. .,... c
-'n c> La- L. =c
- - - ---- - - - LU
---- - - -- - - - - - -U
~ ~ L U149
C-
-A L,. LE <
-- -. ' 5 IS -n L LAJ
0~u
It.~. J Ii IVa
Q. I%.U L.1 C.9 LUU
co
LJ~ ~ 00 UJ U. I-
Ir
Cfl
ocn
9. ILC
.r CIL
.~
*z
W~l
LC="J
isC' I e 9 a-
I" IS Li t-3 I
--- w- w - -- - - I
4 .e i L2 o-M
150 j "
U-8
C9 -
C, A
w L.i
LLWJ .
cL-
LCJ -IJ
tx = = 1 1'.
pe- ~ ~
i.S. U.L w e
LCJU
C4 -z. . - = - wtC xn
~I .U
QC0' I~U- Li 9 g f
41J
C) - C
<L1
<C
LLJ o-
'7
1.151
WLJ LA4 L4J CC
-, -. -3 c.
Zn er
UJ I I
a- Q_ - -j WLA
CC3 C Z
CAIA . IC
LU LUC LW~C .0
C- cn 49.I
LUj cu-
CCC
C LuL 0'
CC U.4 .2 m~-A
=- ,b uV
I-J cz a CL
mU cm CC
Q9
cn L - - LU -
Ucn C- m
C304D'J
I ( r~ U ...-
i L;
In L LACcn
4L La .
C M ~ -M 2:Ina
- 1 C U)
' Q
LjLU >-U
=CC
)-i ~ L
I w) . -)~
LU Ch- .CZ
-L ~~a L= - QC.J .- L I C~
co - C'. -L- wI f
a LU-. !e =I = LU
QLt (fl) r.
ul L' C.: .
CD Lj Lm.
(n
a-agoL..)
=)L
M- ci Uj LU(w
I
CN C4 C14 Cz C4 rn
-
Lz C U a-1. LU 2 -
~ uID n CC52
L=
C14'
5,-
a)'
Lg~
(n --
0- 0cc
~L
Uo" LC LJ
>-- It-
CO in. iCo Z n w.
tj w " .4 r--
ce I -Z t m- * 4 u
- j
~~~a >.. = cc. I
2d
L
-
".-
I I
.i .-
0.
Z
.
CN ".C C..I
4 .JCN L C4I IN 0,4 e4 L C C ZC4C
404C4
ui-
U-1 o0 O-.1 O- I ,.I
r-r-C - r-*C-1'- -I r,0,
153
I-I~- -n
I LUi d L
LU L" ME C2LI LUi
C-)- I -J
CC L.
LULU LAU
LUc f-
1.'LU- IE
La i
ccP.-
I-.
= , I C: .
-L J M La e LW
LU
-LU :3 E-u
cz 1- LL
Le Lo LU -
C4 LUA CL
LM C.2 IAJ L- "J
LU 1 C. Lcc *Ccc
i4 LU :, :
= - LU CA LU
-ce
LUJ
c- - cc
cc.c LU
-c ce- c cc c
-A I" LU <c - g -c
P.-
C, ~IL ' L
.c= 0r-) =a ucco
-M LU c
Cfl L.) I
04 1 -2
wc 1- .- aL
LUr >- LW I c
0--
LiU
-Z I.- c4- 4 4
LL -a LI-U 1--
C,
= = IL I- I
- A . L -A U ! cc L
'1am LU( C
'a
CN CI - CD 4: -0 -4 . . ININ
. INI - C. 10 .0
In ~~- CI CIN1
rW ',4,
ar - M rI C) D- ~rW7 -o r-.~~W -e-, u- r-
-M W- 01 CIC IN
CIN " N IfCIN r N
r4 IN INJ I INI
C'4 IN INl cII
154
L L~j W . OJ19a
I LI ..
j o, -) =~ -j .C a
I. L2 I- Ga-C-a
C4 =- -2
6 Q- C- n Lj 4- -. 4)
-(3 a. a, G
cc~ "o~roC~
-(a 0
_j => :>:>=
- lo
n -j a ci 4,
GA a- A LU
co u) ~LAJ -U, ..
Gau~
5....
I
=
u-ajLu~
-L.
U
U.S
wU~ j ce
I' w
U.*C -
K a... 0n ~
Uj
&D1-u,
IA 'JC'~JC-C-J-.I
CJI'l'4
tC'AI-
-a ~~C~~e'J J C
")I>
co CNNu C'J CLa(14.
155
- ~I- 4flC) , U
C-) cr - L.
-o-
<r - 0
_0 1'.i .A
- -T
a LLJ
LU.1
C.7.
w a-.0
Lu 'C
0. :1- w. 0-
asLi -1 P-7 I
00~-C
-- a a cc C
0o L.J IV
l'- C4 %"0
-0 '2 wj-
cc C
<C-- cc
cc a) 11 LA
do A
Ul -0
<C m >~
cc41 .- ol
L" LU UI
IN- Wa La
'0C 4 CAP
In LU Gaf)-
'J. LU ".
40
~
InL U f) .6)W)
0 II O - r rlf- - - r r UJ-0-0-
M C
rl r CN 14c"
C r 4 N 0 - C rA em'.
156-LUL
-- j U.1
SCD
ce U e
t-)
0 r" r
LL.J = 1
-', L.. m.
r 2
C. ce -
nLJ- IL S.W
LA .l I
- -U -
oze C4 z I
UP US oc '0 '
.U,~~I , i J
LL.SJ >c W e I-
cc0 ca =a0 "0 CA-0-
(.5 U...1 en ..o
cc0 . rm C. C.0
- - Li.I--
c* a* cc a
Ce-
(157
LA
L.Aa
C-M-
Li I
1= =
L.ALO
C4
0- 0.Z
uj Lu
.Ar
CA C- .00-r.
C- n - 0 L.A - no LA
LAI-0 I-LWc
L" c 0Jc L J CA L- - i
Lfl -.1 I CfD
- - >-.AL. .
I~ I Cu, .a.a -
Zi 0
LA = .. J C.... =1 m =
C 0 111 (LA 0of
~ A L., CUJL4 M-
4 LLi
L.A
LOL.
-0
158
CD in
-W CD L.. C
CU7
* CD CA
U.Sj wOC~
co
CD -~ Cf
LULi
LUJ
U) LUJ
Loo
'D -I
t-)U~ Li*4-C
CD) -r
-~~~c -- <c-= U- I
W D
- - - -- -- -- A -n CD L" ID
DCDL..
CD FS I~ L" 4 C1 '-Q 1 0 L 'i
C
wi
D
~~~ .cDn
~ ~" -
CA<CcDiUL
1
UC
d --
L
=L,,
-0
c
C6 Ck-. = LUJ am rU.2 W 0 D
c C mDCD
m~ ~ -rC ~ P"M" LUW qme r rw .V r pS.-.. Ir
Ct2 C'S~
UC ~CDL CD Jq I159 L
o m
_ . c.
co- -0
LUi C"l -
cn = ..- ci
LUL 4zL6
en..a
-0
- L-i
CA unI LU -
0, - L= L Lfl
e~
~
1 - .x i _I,
-. -- a-
CD (mLi
Li L" fl In f.iuj
QC LL. _.1_
an I,_ C-
- x Cc if C4 U" 1 -U
-; 1- am -A IU
-0 LUC.
-na LA . -- ' --
Lo -Z! .- .'4C=I= I
L ID -Ic
I LA -- I kt
0L> =U W= ="z i
,
U_ CDO~ L Cf, :LU I,_ If LC
L', w i . j jc,
0 -
- -vmVmr ~ -
160
LmU
<C -V
uU LU
I L-4
CI L.U
LU U, L4
-
= 4* - I La
It ~ U ~ xLJ ~ . A G-
U, ~~ ~ it- ~ U sZ .Q
=A rcn _j I,
-2 -A cc: if4L"
L 0-- L" t L
Ii 0.- L"-.
('4 ~I ~ L LU Il
2i. L co . LjM
- w- r
Li. r4 LU LU I-W W4 W- w- . -P -W L. -W -- w-
11 ~ ..
LJ~
L 161I Li.
Lu. L61
~
C, Lu u -
L-IL LAJ A
Lu AJ
~~~C
L ca-.u
-M
Q- ~ L" LAu
= Lu ce
-2 1= ' LA
4
to w-0L
L~j L- L"
C.,~~~C ' LI a l .. c
U' 0- cc ce U
a- -cc
L.3
1 U Lu
-. a - - - - >C U-
CI L -CAa 0S COU.
(fl CA:'
L" -cc
-r. Lu .Lu Lul QCu 0-
P,.
. - I- -J
- I -Z
~ w
CA u
-C
g
L L cc L" Lu - 0
CO . -- - ---- I> - u -'L
La
cac
0r - 40 .0 -C
162
LA I--
'0~W L.A 1-
L.A C ~ L.J I-
ac cc -4 L.
05 CA3 -C w
CD L.A0
= <C
6A C3LAUA LA L"A
-. c. L~i :a0L
L.. >a- CdL
Ln LLJ U24~ CC. L
0~ a La IA
I- L.A cn2IL
La L.A -- C =A-
L
~~
1.A1 Enf LAC
L.
IA
Ca 5
WC
)~ ~C - 0
g
C, L~- ~ L.
L.AL - a 4.
Cg2C - ~ -j-
to UJ CL
La In~C
w uj UA , A, .A
LaA -C 2
a- a
*~i - -cc-
C4 LU C.
V
C~ Li
- -U L
La
l- Lz LU
07 C) -ML Ca
c - M - - L
LU I> LJ CUj
--
CcLU
-C
a-~ ~ I 06.
0 Co LWUc
u-, -A LA LU
=~u 0 LU' LU
%U8c C-. ccL
L8)
Q,-L I w-~
LUL
LI sU
- LIla Li
(I) r * LU
L.J -- - j - --
z 11 =U 8-:. nJ
- 8- C41 LU L U
-. 8r 0j -C
co. U- mL =7,= InI-- -e
to) uI L .9c
IIa I I W U - - I
fAU CI e
164LU Ci
a1 0
ce U3 a
- i C
a-
0r- 0- I C~
ui L. -
C14 1=f j L L U,
.In
zu, , a -
.Q - LU I I i a. LAJ LZwa
Cai -uJ.0 O- GD c U-)~~~4
-W -L'G
rG*QC - w ... jw...-aLU 0 -
-1 a-L lb w
>C 0 1 0 .9 =~ 06.
Q..
or00C) cc -
M- CA =n -A. C, - o~
~~ Ii0 G Ga . a7
a C PQ
- II
Ln
*.C = CBc4
4G al It C-
a..~ b La L
- - In GaB I 0
31 J -
o --
165
cn L z
-r t-
La m~ ~ en <
ce La N a ar
=t- = Ln all~
c~ La~
C~ '- ~ C.
t.- Qr- (-) ~
4 La j ao
c~j
t= C
-
-7-- - c r
__ LaW C~
-- M La
L0- vi r
-a-.~
n > La w
I '3
- cm CD
. a
o
~ .14La U
%n tm Co. .4.
-: n~ - a510- UL
-2
=
I
t~
~ oc =c 9
0~
cu
I .
0.
L" ?~
La x- 2J =O*
Sr c= .x. =. L- 3
La> .4c La
- - U2 - L. 'o
- La- La-0 6 0 lfl.. r.
I - .f.J C..- . 0.
c1 m~ I" m m r. r"
.0j F0C
) rl~ u-2 r ~ o . .u.3 r w o , cq m l - , O --
- r, ,
La -. 01 m w = w o A a-o y.c 0.0 0. -U.r
LI 3lu
u) "n3 Ln~ _- Lnu0440I ni r lu nu)u - nu)u - 1U m Q
U, L C C ~ ~ a..-.166a~
mr-. C's
C4 L LD
-c -
L" U LU
wL'i
C= ~ LU
C) a
LULU
I -
ce -I 4
CL C L..I.L" C
C' <=. - I
- r-.m L ULL C
c-o -r -j -z c -e C z
.0 W I c ,-
CcUL cc cn 0
L>-
CC .0) -c W
ro 44)
-I -D -- L"
CL. m A.
LU -- . 0
aqz .
a~~U~
-
Lo. - .CiL~ LU
LULi - LL L-)L
-- - UlO~L
-1-
0= L"O ~
CCD. l' wa
ca cm L. -. 2.
LLi a a. Q
1>L Li LAJ
C4 La x
En 1- CC w
-n CAa -i M z r
LC4 ~ . ce
In Lo
0
~j
-<r -cc~
0- .1- 0i
Cemt -1 i
I~y j)-~L
- -n g- Lj aI I
M -Z
I. '- 'I--4 It
L>C)CAN
4)' *- 0
0 -. L=,
cc 0 4= 1-A- A
Q Ii
. cc=- L
o U' Go m (
(.4 v- uj -1 . ;c :c 0-
-
M. IA
a
La
2
'
o
4
I C)
0~-
U
.
I A
.
~~.
L
I-.
u
Ic
-
co V4 r4 C S!
Col -r -r r . r
VI -0 W
P-1 .r P- m
ON IQ,WZ,. 4v U- .0alw 4P Ira .J l -or l< 1II
0
ruI
4
P-1
- '-C
10 IQ
W
C ~ S- L
- w
c
r w
0
-
-
V
0 -0
-
-0- ~
oU
o1
I nI
L 401
-1u)U)L
0- 0 4 -
l
0a ..
.0
O
-0-0
o.
- .m168
- ~
cm
__j~
C3.
Lu,-
cc. C)n
~ -
c.
Lo I, L L =
'I A5* u = 4, r~
Li P: IZ
-
U, ~ C-4 1 ..
-- 0
-; -
.r ,
LiS - - *-
~
Ui.~.
-
.- ~ S I u. I
*=..
:>5 =.U.-- :>= . Q =
In 5-c 51
-u tn I~.. f cz
3n
o >_ L, n n J.n n Jn S'j -4J
cn to
wi w - 0.o.cy
0o o a a_ 5-o 'o- , . o aD 4 a
~~169
-, I L'i LU -
I-7 I.
- - 7 - C
'0~~~~ - dI
I
I - -
41 1t
I-o - --
I -j Ip W0 *L"I
0
:> U, C; W
U,-L u; U.J,7C
.U,.. C.4 04 C -,
c-, <> :. r, ..
r, C 0 0:
tn
I2 ?C
c:. Z
0,2
~ -0 0- - I . 00 O
,Q we -W -Cej UJ Iw C
E5. 25 l ic . 1=I. LW- -w
Q9 cc C.:
U,~~~7 --
7,II I
-e La cc~
CdC cc0 W
U- !~'CC0,C- LA [w
- o-. - a - - - #. - -- cc .
C4 -P r I, r- co 0. - -0 0 P qU co :
- LUL ~ - -. - -17t
CU kL~~ee -.. -L
~ La
La ~LA - LA CJ
1- I- I- - I
- 12< -C - - f -
__ Ie - D ce D-. D C
Q L- La C a ow CCD .
fLi C C3 . DC
La CD ma b
1- C3 (CD (nC~
C. 1- 0-C -Ci DD U
IK w- :m I-- U.
-' LA - D J C3
CD -ccCD ~ .- 1C C
- C. C LAJ > I- Lx-L
IC C Laj cm LnC ci -j La r
C= -'cc
( CD L - C (M C) I I
Ln 4 CM C. = =
(mCf - LA -W ai LLa Li
22- .2 CA: = 2 It I
wa~ ce-
cr. LL 1,ml
0- - ICD
(m
04
'-J
LXC
=
-C.1-
C .'
=D or.
I
CD
-
D
CD
~ C3
C
goC
~
'a -L t I.-(1 __-jCfC
'n C.1 CD LDC cn DC
< -MCD >c 12 11 >4 i C I(
= C: - M - m I
I
L
= --
acDO I/
-5
a ~~~c
C
-
.-
ICC 1> La
D
.- 2
D C
J ~
LCD U3 'm C <C CDD
I.- cm =a C U LA a L"L a
(12 W. IACcC or.f C2
0. 1- 4cC C I II C I I
C) ~
p CO3 1 I CNIM M m " M"..- P-C MDD.M C4 " ) CDCDn
r
La CD I-.~. CD171
-_j L" LU
-c L.cL -c
.CI Ejc
4z _j .Cl '
oA W LA LA-
~ -Gw
cc-
-
-cNa_=
= ..
L.
-a 00 I.3- EC 1-=.
c-)I'= c )C
'n Lin c L U U .
rt " ,~ J t L
w 4= 000 c 'f
cjLUA AU ~ J
c3 cm < -m
Qc -~j >-A W II
GA .1C
0~ LU
o. cA 'n a) LU _j _j
'C X I LAU -j
W.. U uJ
_* L"~ LU .
u. cc LU"
LU~~kn C.) GA 1w
LIL IQA - I
-r cc.A
C. r - qC. r-w -
0 rrr
-17-
LLA W. 1.1
uJL cc C4.- I
cc tmCOC C2
C-3 COL -
0a
ca C
.- 0
-u L.L.J w C C.
L.
C..-
4, L.l
CC ~
CL I .- C2
-
0 GA
C E
<C u 0 .' L) L
S- G
LU CL .
CN GACOum.
~ ~ crU~ ~ i - U
--
I I
- cc ~ vsL
r)
"4
U, COW
CC
-U, (-a w-
- .- = ~
* C P.- t
COS I=
- > LU *0 U'
L.A atZ -W w O
S.~LA MA -C
%C U, GA
(n cn In C'O w
C& GAi =' -C
U- CPi 1 1=5
.. 8'U m CD
w
r, Cfcf InA li 'A 1 i
-W
L-MI GG
GAG. LIL J
ti- =e L" j G o"
N.. C LCA- C
C3 Oa UC S
C . L . '.
C s
03 C
ci
~ 2% -
cc
COOO
cc c
OO ~
gm.
C
173 O~ C L
LAJ LUJ x : LUJ
I.- _- .1 s LU LU -
- -.
In L
C-)I- I e
-c cL i
co Lj1 c::
L CI- LUU- f
I,- 1- 4='LU .
IL L:
I- I
<C U. LI.I
I-J
U. ~ L
to~- J La
<Cce LU UJ .
4=L LU In CI u. Lo
Li -W
LLU "iL LU
a, a, Li**
1= .4-LU u
G. ~ U- , L al
- -.0 I
is -4 I-
- ol
L M. Q4-
L
U- cc
- ci_
"0
(N
~ J~ PwCC Ww
NI
0 f.
m r-
w
Im r rw
f- a-u 0f,
r. ru lu
LUM WU
l w
,
-
www~~~~~w a ww wmwwCc LUm
174 C
L3 I-
LU I L
-- Le
ui LUL
L's I.- L
L. IU LU C
<c -- f.- LULUn
-j =e =
a- LU - flC
Ce __ =
->
= -
tZ 6e. L1.
w f IC = z-A
cc L Ce _! CfALn
LU uj IIj c-- = -
c4 i-Cwe.- ~ 11ecf
U
L -ccf I~l
~O LUL
5.
Ce * i LC I.- i- LUU ..
col I f '2~ LU - .AJ.
u4 Li- Ce L
Lo -a
f LUj 1- CM zc " LO.I"w
-~j cc =Ji2 -c Is c .
Ce- LU I
oj c. Ce L .. GflIJ
LiI
Cf
8 u)
6 ~~ cc
I-U
6C
I-"~UCe
w-Ww
1= cc I=
- Lu -at
a'O cr ca Cfl LUs C E,
=U Ceac-
1- 11
LIAI WLU I C A
iiI
W- " tJ I= I- Me5 I.
<= 1. L
cU w Cel UJf ~ L e-~
La Cfl L
I ~~ ~
U ~ ~L ~ -- ~-~ U ~
IU C~
uj L=CeIn L e
LU c-3
In
co ~~ccU Q~ a a*~4o G-Q~ Lccc
C Z
o o
r Cfr
rl
oc Cfo cooGoco
r- LU
ow
LUr
,
c
Wfl
c cc o c
175 e~
Lj Cc~ -Jj LAJ _ -:
LA I- C.J _ w ~ -
to Lw0 La
6 cD cr a -W c3I -. j
-~
LU
L -- wL
a ~o.- -LU
l~I j
LU I
LLJ
m w
-
L.
-n
-
M =
ug I-- ~ -
-- ..- 8 =L 2~0 L
~
I ~ LUc u LL L"
Lu 'I LU
w-t~
0 I _ c I ~ n
LaLU 0
I. c= L- u
-~ -cc I--j-
4m
= =I P:I. -j
Lu cc
w !E
Cn U7i.
.-
~ I~
uj L" c3 L ~
ul cnIfU
0 0 0 enc= L
La I. 1= cc ce-~I
LU~I LU LafLU
*- L
-~u u7-
C. cc4U L 0I
L. L- AL U - U LU.
Q6. =
I c
Q- ~ _j
F-4
r'4 La
Z
-- -~
_j
9 - -LA ce
a L. .i
-u LU
na
LlLU
It In=
LA L
Ln
LLA L.
c -cc cuI-j ca :
Ifl 1 L =lc
II I x - c
ac w. QaI.
U 4 L. L _j _j - )
cc GA .im I - 11 -
- m w= OU -L
C vu). r LU
P ~ ~ m I L I w co o L~- cImru ar, C
cpo% o - -o. -ol o-% Io**
. co c l v.cc 0l 0o.0
0- ~ II I .. U, C U, , L - L1-77
LUn
-I--
0.- CA: -
I-
L.
-. -3 La. In
CaJ C-- C. L
-' L.Jo LL c
w - LU-
UI LU
-' -j CCC.
: I., L -L
== C-) L2U wA
<CU J W-
-~ CCu' ~rcn o
-m- L., RU cc
uj ~ A L-) ccU L
6= - w -- I - - C
cc ~ ~ ~ - L
cA!w =- = c
U.A -L0C)
c- LU -j I A = 0
-M LU
c L -ClC
r CA~ -- C2
Coe W
.- CCCL a- -A
-Z --l <r CCL. CcI-cc :,
uC LUA I- -c C
,-~ - 'm A-i
=- 4, .LA 'Ui
00
ccC ca I.-C~>
I <C z ILicc
CK w w CCC w I j tO
C4 r4 Pn r) M W W W-
UW- r Wr)C
-. - - -0-'0
O.I.~ 178L ICA
'In
.- b -
ClZ
a~a
x CA
'-0-
L" LO -
cpu w w on
w X Mr :> LU WO-LU' 9 5 U
Qx- Io C.).C~l> LLA LI
ci Li= = 1 -. AL -- x .-
:> -, 0 U . 4,
Go a.
'0 =
--
a- -C Ln
w. CD do 00
oC .C I M -- V -a
0r a. 4P* -C - *' r0 000. *r
co-0 ~~ l0 ~CP.0 a
.a ~P.<00.D4 ~
9! co0 ~ -~ .o
- - 0 ~ CO179
Li =
uj L) 3 CJ L.J) A
W 'm LLn
V) J
Z. LU) = (. I
- 0 o cw
U U W
C.. . n U w a
6.JJ
.00 -
-~n L-')
'- -. aC
*U)~L - - a
L a 5c. co
U.) LU 0 .< - L
L LU - ILL" L I
S~ -Q -j
4~~~ 40 ~~ )& CI I CI
'aCJp )J. U I * 0~-
L ) CC 12 U) 12 !2 U)
a) U) a) 2 U
212 IL 2 LU
E-EE2E ~Im
I La %I
- LUi
LLU - CLJs =: c~
cm en LU I- -C
C2 L.J
LIj C
'aa
w- -0 LA
MI.-
~~ LU
0- 0.
M Q
CC 0r
j Ur.
0 0
40 L
I~ - La,
w -C I c
'nC.4 0- w -
-> W. Q6.C~l
.-. a C- ra!:
C i-- a- - c0
=. g .- ~U LU L Lai L" Lt Lu LU LU LU LU LU
- - mc i . $.-
U L. L"
C-3
04 .( " I(4
-W U r0 0.0
CP. m~k-W L0 Il w 00-C. C4 t" wf U' f- 10
181
L'a
L4J
.4 at
cc Li
$ U)
cc a . I--U
0- U) -
inI
LU ~CF. C4
0
m~ -
LLA 0L Q-
LCa L4 aL&
A.U
U) a
- Lai I.a a
-, r Q a LaLJI
Ca. I.. I- I-
. P-.-
- c u C
a-'i
w-I--
.
on ~ 0
Ga
cc
C'J~LA L1ac
0.-L
~' La
m
~.0
co, M LU m
3 --- S*.L C. -a
CL I. U to a tA L4.
cc I) cz* 40 -1 # LA -)
.j ' P- L a- I- La
~ ~~a
jItIIw
I
;c - 'n 0 a -- LU
co UL 0
U)LAI
U) L-L U - L U W I..,JI-UL& a- L1a
L L. a j .i, U)
j g- G a
aP- I-±- Z I.-- I - $U I *
ca 0
Ca ac
a-.
C=A
000
IL (1 .0 4=
La J I
- cn )
1- -.
0.a a. Op00
182
ca LS -z -,
C) Qc W IU
C6.c -LUA LU L
LUj c2 Loi
LU- 9-9 LU Z
co LL La LU~a
LU 9~ I. -.. LU L
9- LU- ~U C a
Cd) LU -L I= atj o
t-~c -=C ~ -
'-~L& -LO L U ~9
- L L.4 L. .4 -- ca,
9a LUj cc
I-~~C. ~C. 1= ~ ~
1 1.- co _j I..- 9-.O
OlU LU
- L - R ,.I.. w
cj L
ca U LI LU 9Li.)
cnL .- W LUj
LUI I 9 LAA
Lw c4 LU I Lr L ..- LU ,
cn Q_ r1 LU ga= CD) L
9- = -- -a- c
I~~t L..CDI4"a9 - I-C
I LU
I--L cc
0.3 9-
LU a-.9-"LU
a - Cd)
w % I LU am Ua.
= L- LU 9
-a
~ uj
am
c18
LAa
ILA
cl,
'CL
cn LaJ:! t r
L.J >.. L r
CCC
.D.~~ - cp-C U) u
-c~ 0 -z I-a a n
U7 La ca -.- b
jW -t
P- CI .. J C
Ic LALAa aLJ a A~
4p. -r
VIP W2 UUl-
I- 18-
LUa
m~~ ce
~-g L.
= LUJ C" -
Lu -Z0.
L" La I. mU
- -cc
-. La wU
Icc
-LU Cj LU =
=0- 06
-Ucc L'4
L I CSL
CZ >It -
- = , -
I.
CI..S n I- LU L
L - I-
Q6 .. J -d -i rLcc:
- j 1LA IA U, t =U =I~ -
6 L1
C .0 ULUL L"LU
- -- Lai- 2- L&U
L.M = - <c - C<
(n= ; of - 1
L &U =- . .
m L c 4 j- -M
IL m LU fl L
-S LUA
~LI ULU0..U4L Cfl -a
LC L
cc 0* " - cnc185
LAU
iU -
- - CCc
LUA -; LU
wU~ .0
cc t" La .- IC
LU..- ..
GC I.-U L In LUiC.
LaLa --j - LUJ
-L .4J6 L
W ~ LUC. - LMeCLLU7
I.- = . -,_ = ;
I..LU- IL U- -M cLU
LAJ LU I i I-
= -a AC I.-.LU I.-
I. u cj = #- #.
IC = LaL
Q2. I. -0 fl U
IC C t . L0 .- .LW
I LU n L -
C6. -j - -CO CC-
0..
cn Li 2~IU
-O - I 0 - U= LU
f II I-,- I -
I 0~C-fl ICCl
m LL cc = >-IS
a, ccL I- A a- La 1.-
~~~t
~ I- J, 0- %
-110 I
-- L co w -cc
-~~L ~L -A.
4c - q C6. 7
;z 4L 0M0.M
r .011 LUa II 1E,
- -
Lai UL 1
~I-.7
L U CA: J
*~*~
C
Uf~ ~QC I LUC
-. C4
-o~
,o I t ~ .7 U..186
a2 I-M -
uj w u .-
1: t CflL
-4 U.I M
L:sJ
-- L
LA L-JA
0, C or- -i I C
C -A 4=s 4
co C
w oc = . II-
U- -c
L.A S Qa
cc U,
C =
=0
-W qI.- r r- 4 0 4c
I- Lj
-cb -
U,,
187
A PP E ND IX F
C
CGS D a ta Dic t i o na ry
variables, and processes used in CGS. First, the symbols used in the
data dictionary are defined followed by the data dictionary for CGS.
The terms described in this data dictionary are the terms used in the
actual CGS software.
188
Data Element Definitiona
ALIASES :
ALIASES:
ALIASES:
ALIASES:
ALIASES:
190
DATA ELEMENT NAME: Addressstatus
ALIASES:
ALIASES:
ALIASES:
ALIASES:
191
DATA ELEMENT NAME: Back.-ground_color
-------------------------------------------------------------------------------
ALIASES:
-------------------------------------------------------------------------------
ALIASES:
ALIASES:
----------------------------------------------- -------------------------------
192
DATA ELEMENT NAME: Bits_8_10
ALIASES:
ALIASES:
ALIASES:
193
DATA ELEMENT NAME: Bit_9
ALIASES:
ALIASES:
ALIASES:
ALIASES:
194
DATA ELEMENT NAME: Current_color
ALIASES:
ALIASES:
ALIASES:
COMPOSITION: Currentthreat = azimuth + color + new x_.position
ALIASES:
195
DATA ELEMENT NAME: Degrees
ALIASES:
ALIASES:
ALIASES:
ALIASES:
196
DATA ELEMENT NAME: Emittercount
ALIASES:
ALIASES:
ALIASES:
ALIASES:
197
6d
DATA ELEMENT NAME: Emitterpriority
ALIASES:
ALIASES:
ALIASES:
ALIASES:
ALIASES:
198
DATA ELEMENT NAME: Hardwaremonitordata
ALIASES:
ALIASES:
ALIASES:
ALIASES:
ALIASES :
199
DATA ELEMENT NAME: Lastemitter
ALIASES:
ALIASES:
ALIASES:
ALIASES:
200
DATA ELEMENT NAME: Maximum_RWR.range
ALIASES:
ALIASES:
ALIASES:
ALIASES:
ALIASES:
201
DATA ELEMENT NAME: None_in-progress
ALIASES:
ALIASES:
ALIASES:
ALIASES:
ALIASES:
202
DATA ELEMENT NAME: PCflag
ALIASES:
ALIASES:
ALIASES:
ALIASES:
ALIASES:
203
DATA ELEMENT NAME: SA_3
ALIASES:
ALIASES:
ALIASES:
ALIASES:
ALIASES:
204
DATA ELEMENT NAME: SA_8
ALIASES:
------------------------------------------------------------
ALIASES :
------------------------------------------------------------
ALIASES:
------------------------------------------------------------
ALIASES:
-----------------------------------------------------------
ALIASES:
----------------------------------------------
205
DATA ELEMENT NAME: Staf8
ALIASES:
ALIASES:
ALIASES:
ALIASES:
ALIASES:
206
k • .....
DATA FLOW NAME: Trackjfile..pointer
ALIASES:
ALIASES:
ALIASES:
,ALIASES:
207
DATA ELEMENT NAME: Unk2
ALIASES:
ALIASES:
ALIASES:
ALIASES:
ALIASES:
208
DATA ELEMENT NAME: Wordnumber
DESCRITION: Contains the number of the word being examined from
a CGS track file entry. It has a range from zero to
fifteen.
ALIASES:
ALIASES:
ALIASES:
209
A PP E N I X G
C GS T E ST DOC U ME NT ATIO N
The data used to validate CGS was divided into two separatc files.
one dedicated to the validation of the Parameter mode and the other
dedicated to the RWR mode. Two data bases allowed data to be selected
number data values selected for the Parmeter mode resulted in sixteen
record numbers ranging from one to sixteen. Both the Parameter mode and
the RWR mode data bases were divided into groups, one for each~ type of
number which precedes it. For example, the data words for word number
two are preceded by the number two entered four times. The results of
the execution of CGS with the parameter data base is shown in Table 8.
The results of the execution of CGS with the RWR data base is shown in
210
Table 8. Parameter Display Test Results
211
Table 9. RWR Display Test Results
I SAl 100 0
i SA_2
. 100 22 I
212
Parameter Test Data Base
0
0
0
0
5000
45
5016
5000
5032
5016
5048
5032
5064
5048
5080
5064
5096
5080
5112
5096
5128
5112
5144
5128
5160
5144
5176
5160
5192
5176
5208
5192
5224
5208
5240
5224
45
5240
2
2
2
2
8001
5002
8002
5018
8003
5034
8004
5050
213
Parameter Test Data Base
8005
5066
8006
5082
8007
5098
8008
5114
8009
5130
8010
5178
8013
5194
8014
8015
5226
8016
5242
3
3
3
3
11
5003
22
5019
33
5035
44
5051
55
5067
66
5083
77
5099
88
5115
99
5131
5147
222
5163
214
Parameter Test Data Base
333
517 9
444
5195
555
5211
666
5227
777
5243
4
4
4
4
256
5004
512
5020
768
5036
1024
5052
1280
5068
1536
5084
1792
5100
2048
5116
2304
5132
25C'W,0
5149
281(,
516~4
3072
5180
3328
5196
3584
5212
3840
5228
4096
5244
5
5
5
5
215
Parameter Test Data Base
256
5005
512
5021
768
5037
1024
5053
1280
5069
1536
5085
1792
5101
2048
5117
2304
5133
2560
5149
2816
5165
3072
5181
3328
5197
3584
5213
3840
5229
4096
5245
6
6
6
6
1057
5006
2114
5022
3171
5038
4228
5054
5288
5070
6336
5086
7392
5102
216
Parameter Test Data Base
8448
5118
9504
5134
10560
5150
11616
5166
12672
5182
13728
5198
14784
5214
15840
5230
16896
5246
7
7
7
7
1025
5007
2050
5023
3076
5039
4104
5055
5120
5071
6144
5087
7168
5103
8192
5119
9216
5135
10240
5151
11264
5167
12288
5183
13312
5199
14336
5215
217
Parameter Test Data Base
15872
5231
16384
5247
8
8
8
8
2337
5008
4674
5024
7011
5040
9348
5056
11685
5072
14022
5088
16359
5104
16384
5120
18432
5136
20480
5152
22528
5168
24576
5184
26624
5200
28672
5216
30720
5232
32768
5248
9
9
9
9
4480
5009
5888
5025
6400
5041
218
Parameter Test Data Base
5888
5057
4480
5073
2432
5089
0
5105
5728
5121
3680
5137
2272
5153
1760
5169
2272
5185
3680
5201
5728
5217
0
5233
243 2
5249
10
10
10
10
4480
5010
2432
5026
0
5042
5728
5058
3680
5074
2272
5090
1760
5106
2272
5122
3680
5138
5728
5154
219
Parameter Test Data Base
0
5170
2432
5186
4480
5202
5888
5218
6400
5234
5888
5250
12
12
12
12
11
5012
22
5028
33
5044
44
5060
55
5076
66
5092
77
5108
88
5124
99
5140
11
5156
22
5172
33
5188
44
5204
55
5220
66
5236
77
5252
13
13
220
I;
Parameter Test Data Base
13
13
65
5013
128
5029
193
5045
256
5061
321
5077
384
5093
449
5109
512
5125
577
5141
641
5157
705
5173
768
5189
833
5205
896
5221
961
5237
1024
5253
14
14
14
14
8
5014
16
5030
24
5046
32
5062
40
5078
48
5094
221
Parameter Test Data Base
56
5110
64
5126
72
5142
80
5158
88
5174
96
5190
104
5206
112
5222
120
5238
128
5254
15
15
15
15
1
5015
2
5031
3
5047
4
5063
5
5079
6
5095
7
5111
8
5127
9
5143
10
5159
11
5175
12
5191
13
5207
222
Parameter Test Data Base
14
5223
15
5239
16
5255
45
5192
15
5239
16
5255
223
RWR Test Data Base
5000
45
5016
5000
5032
5016
5048
5032
5064
5048
5080
5064
5096
5080
5112
5096
5128
5112
5144
5128
5160
5144
5176
5160
5192
5176
5208
5192
5224
5208
5240
5224
45
5240
9
9
9
9
10
10
10
10
8001
5002
4480
5009
4480
5010
8002
5018
224
RWR Test Data Base
5888
5025
2432
5026
8003
5034
6400
5041
0
5042
8004
5050
5888
5057
5728
5058
8005
5066
4480
5073
3680
5074
8006
5082
2432
5089
2272
5090
8007
5098
0
5105
1760
5106
8008
5114
5728
5121
2272
5122
8009
5130
3680
5137
3680
5138
8010
5162
2272
5153
225
RWR Test Data Base
5728
5154
8011
5162
1760
5169
0
5170
8012
5178
2272
5185
2432
5186
8013
5194
3680
5201
4480
5202
8014
5210
5728
5217
5888
5218
8015
5226
0
5233
6400
5234
8016
5242
2432
5249
5888
5250
0
0
0
0
45
5224
0
0
45
5208
0
0
226
RWR Test Data Base
45
5192
0
0
45
5176
0
0
45
5160
0
0
45
5144
0
0
45
5128
0
0
45
5112
0
0
45
5096
0
0
45
08
08
0
45
5064
0
0
45
5048
0
0
45
5032
0
0
45
5016
0
0
45
5000
227
RWR Test Data Base
0
0
45
45
0
0
0
0
9
9
9
9
10
10
10
10
8001
5002
4480
5009
4480
5010
8002
5018
5888
5025
2432
5026
8003
5034
6400
5041
0
5042
5888
5089
57228
RWR Test Data Base
2272
5090
8016
5098
0
5105
1760
5106
8017
5114
5728
5121
2272
5122
8018
5130
3680
5137
3680
5138
8019
5162
2272
5153
5728
5154
8020
5162
1760
5169
0
5170
8021
5178
2272
5185
2432
5186
8022
5194
3680
5201
4480
5202
8023
5210
5728
5217
5888
5218
229
RWR Test Data Base
8024
5226
0
5233
6400
5234
8025
5242
2432
5249
5888
5250
0
0
0
0
230
RWR Test Data Base
!iLA
231
T[NCT.AS9TFTFl
SECURITY CLASSIFICATION OF THIS PAGE (When Dea
wErtered)_
REPORT DOCUMENTATION PAGE READ INSTRUCTIONS
BEFORE COMPLETING FORM
I REPORT NUMBER 2. GOVT ACCESSION NO. 3. RECIPIENT'S CATALOG NUMBER
AFIT/GCS/EE/81 D-18
4. TITLE (and Subtitle) S. TYPE OF REPORT & PERIOD COVERED
9. PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMENT. PROJECT. TASK
Air Force Institute of Technology (AFIT/EN) AREA&WORK UNIT NUMBERS
Wright-Patterson AFB, OH 45433
SCHEDULE
17. DISTRIBUTION STATEMENT (of the ebetrect entered in Block 20, If ditferent from Report)
20. ABSTRACT (Continue on ro.er.e side Itneces.ry and identify by block number)
See Reverse
Continuation of Block 20
II
UNCLASSIFIED
SECUI);T, CLASSIFICATION OF ---- PAGEAn;' Z.,?e
OWSre