Find a Security Clearance Job!


WIN-T Capabilities

WIN-T was designed to exploit then state-of-the-art communications, terrestrial and airborne assets, space-based resources, computing systems and capabilities to provide the Army with technical advantages to meet the battlefield Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) challenges of the 21st century. WIN-T would provide infosphere connectivity between OF units, leveraging Joint Tactical Radio System (JTRS) enabled, embedded C2 communications capabilities. This would allow the Army's OF to concentrate combat power through the employment of smaller units that are more capable, survivable, and lethal vice the traditional massing of forces.

Warfighter and signal units employ their organic WIN-T systems to integrate wide and local area battlefield networks into a commercial information technologies-based tactical network. WIN-T would connect all users from theater to the maneuver battalion, to joint and multinational elements, and to the Defense Information System Network (DISN). WIN-T would employ a combination of terrestrial, airborne, and satellite-based transport options, to provide robust connectivity. WIN-T was also intended to exploit the Global Information Grid (GIG) to allow worldwide connectivity.

The Project Manager WIN-T was empowered to use ingenuity, creativity and imagination in acquiring a Terrestrial Transport System (TTS). Plans envisioned that the system would carry the bulk of the data required by division-, corps- and theater-level commanders. The objective of the TTS was to assure that Army ground forces gain information dominance in a high-technology battlefield envisioned for the next millennium.

To accomplish this objective, the TTS would comprise asynchronous transfer mode (ATM) backbone switches, Integrated Services Digital Network (ISDN) access switches, and High-Capacity Line-of-Sight (HCLOS) radios, as well as wireless communications used in both local area networks and Personal Communication Services (PCS). These capabilities would be achieved primarily through technology insertion and enhancement of the current Area Common User System such as the Mobile Subscriber Equipment (MSE) located at division/corps, and the Tri- Service Tactical (TRITAC) equipment at Echelons Above Corps (EAC).

The TTS Network Management was stated to be crucial to planning, building, and maintaining the dynamic information networks required to gain information dominance in the next millennium. To achieve this specific objective, the evolving Integrated System Control (ISYSCON), the TSS Network Management System, would manage battlefield spectrum, communications security (COMSEC), Wide Area Networks, network engineering, and signal command/control.

Key components of the ground layer were the Joint Tactical Radio System (JTRS) Cluster 1 radio (subsequently JTRS Ground Mobile Radio), the personal communications device, and the secure wireless local area network. The airborne layer would consist of opportunistic commercial or military aircraft and unmanned aerial vehicles or tethered air vehicles with the WIN-T Airborne Communications Node to provide beyond line-of-sight communications. The space layer would include commercial and military satellites such as the Wideband Gapfiller or Advanced Extremely High Frequency satellites to provide reach-back to the Global Information Grid.

WIN-T's infrastructure was designed to provide commanders and other users, the ability to communicate via voice, data, and video simultaneously at levels of security from sensitive but unclassified (SBU) to Top Secret. WIN-T supported the warfighter's requirement for Command and Control On-the-Move (C2OTM) by integrating the major WIN-T elements into warfighter mobile tactical operations center (TOC) platforms while leveraging the Joint Tactical Radio System (JTRS), wide-band digital radios, and wireless local area network (LAN) technologies.

Join the mailing list

Unconventional Threat podcast - Threats Foreign and Domestic: 'In Episode One of Unconventional Threat, we identify and examine a range of threats, both foreign and domestic, that are endangering the integrity of our democracy'

Page last modified: 07-07-2011 02:49:02 ZULU