Distribution: Web Release Only
Initiated By: AJM-2440
U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION
Air Traffic Organization Policy
ORDER
JO 6131.5
Effective Date:
July 30, 2012
Implementation Date
October 1, 2012
SUBJ: Maintenance of the Airport Resource Management Tool (ARMT) Equipment
1. Purpose. This order provides guidance and prescribes technical standards and tolerances, and
procedures applicable to the maintenance of Airport Resource Management Tool (ARMT)
equipment. This information augments information available in instruction books and other
handbooks, and complements the latest edition of Order 6000.15, General Maintenance Handbook
for National Airspace System (NAS) Facilities. This order implements Configuration Control
Decision (CCD) XXXX, Update ARMT TI and Maintenance Handbook for Technology Refresh
(Case File T1450-ARMT-1002, NCP 24238)
2. Audience. This document requires actions by the Airway Transportation System Specialist
(ATSS) at operational facilities with Facility, Service, and Equipment Profile (FSEP) equipment:
FDRS with Facility Code CV01 (EFSTS with ARMT).
3. Cancellation. Not applicable.
4. Explanation of Changes. Not applicable.
5. Forms Listing. FAA Forms may be electronically downloaded at:
https://employees.faa.gov/tools_resources/forms/.
6. Risks. The Safety Risk Management Report is available at:
http://nas.amc.faa.gov/technical_library/browse?type=mtd&file=6131_5_mthb_srmrpt.pdf.
a. Recommendations for Improvement. .Users are encouraged to submit recommendations for
improvements to [email protected].
8. Implementation Date. The implementation date is when all facilities nationwide must comply
with these changes. The changes may be implemented anytime after the effective date, but must
be implemented by the date located on the front of this document. If the implementation date
occurs during a completed task interval window then you may follow the new guidance for the
certification or maintenance task(s) at the next regularly scheduled interval.
Vincent Capezzuto, AJM-2
Director of Air Traffic Systems
xx/xx/2012 JO 6131.5, CHG 1
Record of Changes Directive No. JO 6131.5
CHANGE
SUPPLEMENT
CHANGE
SUPPLEMENT
TO OPTIONAL TO OPTIONAL
BASIC BASIC
1 Update for Technology Refresh, document changes
to security requirements published 2011.
FAA Form 1320-5 (6-80) USE PREVIOUS EDITION
xx/xx/2011 JO 6131.5, CHG1
i
Table of Contents
Chapter 1. General Information and Requirements
Paragraph Page
100. Purpose of this Order ....................................................................................................... 1-1
101. Audience .......................................................................................................................... 1-1
102. Where Can I Find This Order ........................................................................................... 1-1
103. Aircraft Accidents ............................................................................................................. 1-2
104. Maintenance and Modification Procedure ........................................................................ 1-2
105. Implementation Date ....................................................................................................... 1-2
106. Information Security ......................................................................................................... 1-2
107. System Administration ..................................................................................................... 1-3
108. Media Access, Protection, Sanitization, and Disposal .................................................... 1-3
109. Equipment Spares, Depot Support, and Disposal ........................................................... 1-4
110. Configuration Management .............................................................................................. 1-4
111. Physical Access, Personnel Security, and Environmental Control .................................. 1-4
112. Contingency Planning ...................................................................................................... 1-5
113. Training ............................................................................................................................ 1-5
114. Incident Reporting ............................................................................................................ 1-5
115. – 199. Reserved ................................................................................................................ 1-5
Chapter 2. Technical Characteristics
200. General ............................................................................................................................ 2-1
201. Description ....................................................................................................................... 2-1
202. Theory .............................................................................................................................. 2-3
203. ARMT Server Workstation ............................................................................................... 2-5
204. ARMT Client Workstation ................................................................................................. 2-7
205. Uninterruptible Power Supply (UPS) ............................................................................... 2-7
206. Network Module Switch (Ethernet Switch) ....................................................................... 2-7
207. Domain Controller ............................................................................................................ 2-8
208. – 299. Reserved. .............................................................................................................. 2-9
Chapter 3. Standards and Tolerances
300. General ............................................................................................................................ 3-1
301. ARMT ............................................................................................................................... 3-1
302. – 399. Reserved ............................................................................................................... 3-1
xx/xx/2011 JO 6131.5, CHG1
ii
Table of Contents (Continued)
Paragraph Page
Chapter 4. Periodic Maintenance
400. General. ........................................................................................................................... 4-1
401. - 429. Reserved. .............................................................................................................. 4-1
Section 1. Performance Checks
430. Daily ................................................................................................................................. 4-1
431. Monthly ............................................................................................................................ 4-2
432. Quarterly .......................................................................................................................... 4-2
433. – 479. Reserved. ............................................................................................................... 4-2
Section 2. Other Maintenance Tasks
480. Quarterly ........................................................................................................................... 4-3
481. – 490. Reserved. .............................................................................................................. 4-3
Section 3. Special Maintenance Tasks
491. As REquired ..................................................................................................................... 4-4
492.- 499. Reserved ................................................................................................................ 4-4
Chapter 5. Maintenance Procedures
500. Purpose ............................................................................................................................ 5-1
501. Technical Performance Records Entries ......................................................................... 5-1
502. - 519. Reserved. .............................................................................................................. 5-1
Section 1. Performance Checks
520. General ............................................................................................................................ 5-1
521.-549. Reserved ................................................................................................................. 5-2
Table of Contents (Continued) Paragraph Page
xx/xx/2011 JO 6131.5, CHG1
iii
Section 2. Other Maintenance Tasks
550. General ............................................................................................................................ 5-3
551. Security and System Administration Procedures ............................................................. 5-3
552. – 569. Reserved ............................................................................................................... 5-3
Section 3. Special Maintenance Tasks
Paragraph Page
570. General ............................................................................................................................ 5-4
571. – 599. Reserved. .............................................................................................................. 5-4
Chapter 6. Flight Inspection
600. Flight Inspection is not Required for the ARMT System .................................................. 6-1
601. – 699. Reserved. .............................................................................................................. 6-1
Chapter 7. Glossary
700. Abbreviations and Acronyms ........................................................................................... 7-1
Appendix A. Field Support Information
List of Figures
Figure 2-1. ARMT Client Server Configuration ......................................................................... 2-4
Figure 2-2. Generic ARMT System Configuration .................................................................... 2-5
Figure 5-1. ARMT Server Setup ............................................................................................... 5-1
List of Tables
Table A-1. Second Level Support Point of Contact List ............................................................ A-1
iv
This Page Intentionally Left Blank
xx/xx/2012 JO 6131.5
1-1
Chapter 1. General Information and Requirements
100. Purpose of this Order. The purpose of this order is to provide the necessary guidance
for the proper maintenance of Airport Resource Management Tool (ARMT) equipment. Use this
handbook in conjunction with information available in instruction handbooks and other
directives.
a. Hardware maintenance of the ARMT system is performed by field-level personnel, and is
based on the use of modular equipment that permits them to correct equipment failures on-site by
replacing failed the Lowest Replaceable Unit (LRU).
b. The ARMT site maintenance includes scheduled preventive maintenance, unscheduled
corrective maintenance, and FAA approved modifications.
c. Software Maintenance of the ARMT system must be performed without violation of the
ARMT availability requirements.
101. Audience.
a. This document requires actions by the Airway Transportation System Specialist (ATSS) at
operational facilities with Facility, Service, and Equipment Profile (FSEP) equipment: FDRS
(Flight Data Remoting System) FACID-CV01 (EFSTS with ARMT) or CV02 (ARMT only).
b. The ATSS and all administrative personnel must subscribe to the Auto-Notifications
Services for electronic library release notifications at http://technet.faa.gov/. Administrative
offices can print these documents for local use as required.
102. Where Can I Find This Order.
a. For electronic copies, use the Technical Library website at:
http://nas.amc.faa.gov/technical_library/index.jsp.
b. The ATSS must keep accurate FSEP records and Logistics Inventory System (LIS)
addresses to receive printed copies. Printed copies are mailed to the ATSS at operational
facilities with an accurate FSEP record using the LIS mailing address per Order 6000.5D,
Facility, Service, and Equipment Profile (FSEP).
c. To update FSEP information, visit this link.
FSEP link.
d. To update LIS information, visit this link:
http://impart.faa.gov/impart/home.html.
e. The Periodic Maintenance/Certification Scheduling (PMS) database is maintained by the
Office of Primary Responsibility (OPR). The release of this document notifies the field of an
update to the Remote Monitoring and Logging System (RMLS) National PMS database. An
RMLS template will be available to the field for remote maintenance logging in approximately
five working days after release of this document.
xx/xx/2012 JO 6131.5
1-2
103. Aircraft Accidents. When aircraft accidents or incidents occur, Air Traffic Organization
(ATO) Technical Operations personnel are responsible, when requested by the Technical
Operations Aircraft Accident Representative (AFAAR) through the appropriate control center, to
evaluate and document the technical performance of the facilities which may have been involved
(for some facilities, it may also be necessary to remove them from service, and to conduct flight
inspections). This requires that facility operational data be obtained and recorded in the
maintenance log and on FAA Form 6000-8, Technical Performance Record (TPR). These
records are official documents, and may be used by an aircraft accident investigation board in the
determination of facility operational status at the time of the accident.
See the latest edition of Order 8020.16, “Air Traffic Organization Aircraft Accident and Incident
Notification, Investigation, and Reporting,” for detailed guidance on requirements and activities
following an aircraft accident/incident.
104. Maintenance and Modification Procedure.
a. Order 6000.15, this MTHB, the applicable equipment instruction book, and other
applicable handbooks are consulted and used together by the maintenance technician in all
duties and activities for the maintenance of ARMT. These documents are considered
collectively as the single official source of maintenance policy and direction authorized by
Technical Operations Services. References located in the appropriate paragraphs of this
handbook entitled Chapter 3, Standards and Tolerances, Chapter 4, Maintenance
Requirements, and Chapter 5, Maintenance Procedures, indicate to the user whether this
handbook and/or the equipment instruction book shall be consulted for a particular standard,
key inspection element or performance parameter, performance check, maintenance task, or
maintenance procedure.
b. The latest edition of Order 6032.1, National Airspace System Modification Program,
contains comprehensive direction concerning the development, authorization,
implementation, and recording of modifications to facilities, systems, and equipment in
commissioned status. It supersedes all instructions published in earlier editions of MTHBs
and related directives.
c. Refer to Order 6000.15 for shutdown, coordination and scheduling policy.
105. Implementation Date. The implementation date is when all facilities nationwide must
comply with these changes. The changes may be implemented anytime after the effective date,
but must be implemented by the date located on the front of this document. If the
implementation date occurs during a completed task interval window then you may follow the
new guidance for the certification or maintenance task(s) at the next regularly scheduled interval.
106. Information Security. The ARMT is included in the NAS security authorization and
certification program, as such is required to support continuous information system security
xx/xx/2012 JO 6131.5
1-3
monitoring and control. The ARMT program office is responsible for providing annual security
documentation to describe the system compliance with published FAA Orders and other security
requirements documentation that impose security controls and measures to protect the system
from information security intrusions and events. ARMT field maintenance personnel are
required, as part of either routine performance checks or other maintenance tasks to perform
specific security procedures for the system. These procedures are described in this document,
the ARMT Technical Instruction Book (TI) and in the ARMT Security & System Administration
Procedures Handbook. Specifically designated site maintenance personnel (such as System
Management Office (SMO) and/or System Support Center (SSC) managers, or designated
System Support Specialists) may be required to perform additional information security tasks
(security administration procedures and/or system administration procedures) that not included in
the scope of this document as required actions for all site maintenance personnel. These
additional tasks are associated with system user access accounts, security-specific training,
incident reporting and response, security administration, auditing and reporting procedures
published for the system and included in the ARMT Security & System Administration
Procedures Handbook. All Airway Transportation System Specialists (ATSS) are required to be
familiar with local security policies not covered by this handbook. This document is available in
the ARMT Resources folder on client and server workstations, from the ARMT Knowledge
Sharing Network (KSN) site or by contacting the ARMT program office.
107. System Administration. ARMT system log in procedures establish user access
privileges implementing least privilege access based upon separation of duties. ARMT field
maintenance personnel are afforded privileged access to ARMT system resources as System
Administrators. These access rights are established to support roles and responsibilities for
system maintenance. System administration access controls established for ARMT allow
maintenance personnel to access software resources, system settings, configuration, and other
features as well as to provide access to system components for the purposes of system
troubleshooting, service, restoration, and other maintenance tasks. ARMT system administrators
(SAs) are provided special access through SA group log in accounts. ARMT SA access may
also be authorized for designated air traffic personnel. Second level support personnel from the
WJHTC are afforded exclusive access rights designated for Super System Administrators via a
privileged group account exclusive to program office engineering personnel for site and remote
maintenance and administration access. All designated ARMT site maintenance personnel have
system administration duties, described in this document and the corresponding technical
instruction book, also include specific security administration performance checks and activities
described in the ARMT Security & System Administration Procedures Handbook. This
document is available in the ARMT Resources folder on client and server workstations, from the
ARMT Knowledge Sharing Network (KSN) site or by contacting the ARMT program office.
108. Media Access, Protection, Sanitization and Disposal. ARMT does not include
personally identifiable information (PII) but does include NAS operational data that is
considered security unclassified information (SUI) and for official use only (FOUO). Some
ARMT data can be ported to external media/devices (USB memory, compact disk, etc.) for the
purposes of reporting, investigation, and other operational and maintenance support activities.
All Sensitive Security Information (SSI) and/or For Official Use Only (FOUO) information
requiring protection during physical transport outside the system-controlled area is protected in
accordance with the requirements defined in FAA 1600.75, Protecting Sensitive Unclassified
xx/xx/2012 JO 6131.5
1-4
Information (SUI), as amended, Chapter 3 Section 12a, b, and c. ARMT data and media used to
store ARMT data must be protected in accordance with FAA Order 1370.111, Removable Media
Security Policy, and program office published rules of behavior (RoB) guidance provided to all
sites and system users. Media used to access, store or retain ARMT data retrieved from system
workstations shall be managed in accordance with Media Sanitizing and Destruction Policy. All
ARMT maintenance personnel are required to comply with FAA Order 1370.111, FAA Order
1370.100, and FAA Order 1600.75. Additional guidance and procedures supporting the FAA
Orders and related to ARMT media access, control, sanitization and disposal are included in the
published ARMT Rules of Behavior (RoB) document and in the ARMT Security & System
Administration Procedures Handbook.
109. Equipment Spares, Depot Support, and Disposal. ARMT system equipment spares
and depot support are currently provided from the second level support team at the WJHTC.
Procedures for handling equipment are described in this document and in the technical
information book for ARMT. Future depot services may be provided by the FAA Logistics
Center. When the ARMT service level agreement with the FAA Logistics Center is completed,
procedures for handling spares, depot support requests for equipment service or replacement will
be provided as an update to the technical instruction book. The ARMT program office has
published an equipment disposal plan for the system that provides procedures for the removal,
sanitization and disposal of ARMT system equipment. This document is available in the ARMT
Resources folder on client and server workstations, from the ARMT Knowledge Sharing
Network (KSN) site or by contacting the ARMT program office.
110. Configuration Management. Configuration Management (CM) policies and procedures
for ARMT are driven by FAA Order 1800.66, Configuration Management Policy, Change 2, in
conjunction with the guidelines within the AMS, and any relevant portions of Order 1800.8,
National Airspace Configuration Management. Procedures are reviewed and updated every two
years, or when the requisite orders undergo major revisions or expire. All ARMT components
are under FAA Configuration Management IAW FAA Order 1800.66. Any ARMT system
baseline changes are made IAW the established FAA policy and changes are tracked using FAA
common controls and systems, such as the document control system (Harvest/SCM) and the
FAA Configuration Management tool (WebCM) both of which are FAA enterprise network tools
provided to program owners to support system configuration management, change control,
baseline configuration management, document control, document storage, document archive and
document storage among other features. ARMT configuration changes are documented and
recorded by the program management office and reported to the FAA’s configuration
management system (WebCM). The ARMT program office also retains a manual database of
system configuration changes during development, testing activities associated with software
modifications and enhancements.
111. Physical Access, Personnel Security, and Environmental Controls. All ARMT
system assets are located in FAA controlled facilities, overall physical and environmental
security control is provided by the Office of Safety and Hazardous Materials (ASH). FAA
physical access, personnel security and environmental control (such as fire protection, power,
heating-air conditioning-ventilation, among other environmental conditions) procedures are
provided by common controls established and implemented by the Office of Safety and
xx/xx/2012 JO 6131.5
1-5
Hazardous Materials (ASH) in accordance with FAA Order 1600.69, FAA Facility Security
Management Program, as amended and FAA Order 1600.6, Facility Security Policy, as
amended. The policy and procedures contained in FAA Order 1600.69 and FAA Order 1600.6
and DOD F 1630.5, Visitor Clearance, are reviewed and updated on a schedule determined by
ASH.
112. Contingency Planning. System Support Center (SSC) Managers are responsible for
local contingency and disaster recovery planning. Plans are developed in accordance with FAA
Order 1900.47, ATO Operational Contingency Plan (OCP) and include storage of operational
software and site adaptations; system configuration, and inventory; and frequency and scope of
backups if not specified in the maintenance handbook. The ARMT program office, as part of
annual security authorization and certification activities, publishes an ARMT information
System Security Contingency Plan (ISCP) document that provides additional system-specific
information to sites to support restoration of the system in the event of a facility disaster. Copies
of this security-controlled document are available from the ARMT program office and are
provided in response to written email request by encrypted return reply. The ARMT ISCP does
not replace or supersede local site contingency plans or emergency plans, but does provide
required information security documentation for the system to comply with FAA security
requirements.
113. Training. ARMT system–specific user and maintenance training is provided by the
program office. Site training managers are required to maintain training records for personnel
completing familiarization and/or eLMS training courses available for ARMT. Specific forms
and procedures for the conduct of security training are included in the ARMT Security & System
Administration Procedures Handbook, available in the ARMT Resources folder on client and
server workstations, from the ARMT Knowledge Sharing Network (KSN) site or by contacting
the ARMT program office.
114. Incident Reporting. If site maintenance personnel become aware or suspect an
information system security incident or other NAS incident, the procedures and reporting process
are to be followed in accordance with national procedures published in FAA Order 1920.5,
Technical Field Operations Services Field Incident Response (FIR). ARMT does not have
separate system-level incident response procedures.
115. – 199. Reserved.
xx/xx/2011 JO 6131.5,
2-1
Chapter 2. Technical Characteristics
200. General. This chapter provides a general description of the technical characteristics of
ARMT system components and the system concept of operations based upon approved National
Airspace System (NAS) requirements.
201. Description.
a. Introduction. The ARMT is a traffic management tool used in the daily ATC
operation of the associated airport. The ARMT automatically tracks arrival and departure NAS
delays. The ARMT provides an aural notice when an aircraft that has taxied out is within ten
minutes of being terminated from NAS, or when an aircraft destined for an approach request
(APReq) or Ground Stop airport taxies. ARMT provides flight plan information, flight status,
delay information, and other data to support traffic management operations, delay management,
reporting and tactical flight management. Using a secure data network at Air Traffic Control
Towers (ATCTs), Terminal Radar Approach Control Facilities (TRACONs), Air Route Traffic
Control Centers (ARTCCs) and the Air Traffic Control System Command Center (ATCSCC),
the ARMT system uses information received from other NAS automation systems to provide
traffic managers with real-time status on arrival and departing aircraft in the terminal area. To
receive data, the ARMT currently interfaces with the following systems:
(1) Automated Radar Terminal System (ARTS)
(2) Electronic Flight Strip Transfer System (EFSTS)
(3) Standard Terminal Automated Replacement System (STARS)
(4) National Aeronautics and Space Administration (NASA) Surface Movement
Advisory (SMA) – Atlanta (A80) only
(5) FAA Telecommunications Infrastructure (FTI) Operational Data Network
Note: The validity of the data presented to the user by the ARMT is only as accurate as the
data received from the ATC or other interfacing system when the ARMT is operational.
b. Hardware Overview. The ARMT is base-lined with the following components:
(1) Server Workstations. The ARMT TRACON baseline system has been designed
with commercial-off-the-shelf (COTS) Pentium based desktop computers,
running a Windows Operating system. Two Server workstations are required at
TRACON locations for redundancy. The following are installed in the Server
Workstation.
(a) RS-422 Serial Communications Card. ARMT server computers include a
four (4) port Sea Level Peripheral Component Interconnect (PCI) Card. The
RS-422 ports on the server allow the servers to communicate with external
NAS systems via direct cable connections for data transfer, such as with the
EFSTS.
xx/xx/2011 JO 6131.5,
2-2
(b) Ethernet 10/100 LAN Card (NIC). Server and client workstations have
installed NICs to support internal and external data communications.
The following are connected to a Server Workstation.
(c) Monitors 17” or 19” (may have more than one depending on operational
requirements.
(d) Keyboard and Mouse
(e) Uninterruptable Power supplies (UPS). The ARMT program baseline
requires that ARMT be connected to the commercial power at the ATC
facility. To provide additional protection in the event of power loss, the
ARMT provides UPS connectivity to client and server computers to provide
backup power at ATC sites. ARMT UPS equipment is COTS and includes
UPS system status and troubleshooting application software installed on
client and server computers.
(f) External Hard Drive. The primary server is connected to a COTS external
hard drive is used to support system backup, archiving and storage of
ARMT site data locally. External hard drives are connected to the server via
USB.
(g) Network Switch Module (Ethernet Switch). Data communications
between the server and the FAA Telecommunications Infrastructure (FTI)
operational data network are provided via a 24-port maximum COTS
switch. This device provides TCP/IP data connectivity between local clients
and servers over the site ARMT local area network (LAN) via Cat5e
Ethernet connection. ARMT communications data between the TRACON
server and remote clients (such as non-collocated ATCTs and ARTCCs) is
supported via the ARMT Network Switch connectivity to the FTI secure
operational data network.
1 Optional Fiber Switch Module.
2 Optional Cat5e Extender. Some ATC facilities require additional
ARMT equipment to support ARMT network/LAN communications
where the distance between the switch or server to the client workstation
exceeds 100 meters and exceeds the data integrity of Ethernet cable. At
these locations, the ARMT network is supported by a Cat5e extender
switch that provides repeater services to ensure integrity of data
communications over the network.
(h) A/B Switch. To connect the Server workstations to EFSTS.
(2) Client Workstations. Are Pentium-based computers running a Windows
Operating System. The total number of client workstations is dependent on the
ATC operational configuration required for each site.
(a) Monitors 17” or 19” (may have more than one depending on operational
requirements.
(b) Keyboard and Mouse
xx/xx/2011 JO 6131.5,
2-3
(c) Uninterruptable Power supplies (UPS) (same as UPS connected to
Server)
(d) Network Switch Module (Ethernet Switch) (same switch as connected to
Server)
1 Optional Fiber Switch Module.
2 Optional Cat5e Extender.
(e) Network Printer. Each ARMT ATC site is provided one COTS network
laser printer connected to the ARMT LAN via Ethernet to support printing
of ARMT reports, data, and other application-specific products. ARMT
network printers are not installed on local facility LANs and are intended to
be used to support ARMT operations only.
(f) Speakers (ATCTs only). At ARMT ATCTs only, COTS speakers are
connected to the client workstation to support aural alert functions to users
(3) Domain Controller – Located at WJHTC only.
202. Theory. The ARMT system is a server / client system. The minimum hardware for the
ARMT system consists of two servers, a client workstation with a monitor, and a Network
Switch Module (Ethernet switch). Refer to Figure 2-1, ARMT Client Server Configuration.
The client systems communicate with the server over RJ-45 cable connected through the
Network Module switch. Refer to Figure 2-2, Generic ARMT System Configuration.
ARMT activity does not affect the presentation of any interfacing ATC system. ARMT uses
COTS hardware to interface with the following systems: EFSTS, SMA, and STARS or
ARTS.
xx/xx/2011 JO 6131.5,
2-4
FIGURE 2-1. ARMT CLIENT SERVER CONFIGURATION
xx/xx/2011 JO 6131.5, CHG 1
2-5
FIGURE 2-2. GENERIC ARMT SYSTEM CONFIGURATION
203. ARMT Server Workstations. Each TRACON has two servers deployed, one serves as
a primary server; the second as a backup server. Both Server Workstations run in parallel for
redundancy, system performance and system recovery in the event of a server failure. Software
running in both servers is FAA-developed ARMT application and related applications, COTS
software including antivirus and MS Office Professional. The applications are pre-loaded on the
servers by the program office prior to installation. No other COTS software applications are
authorized on ARMT servers or clients.
The Primary/Active Server workstation interfaces to NAS for retrieval of flight plans from
ARTS/STARS, EFSTS, and SMA (A80 only). The Backup/Non-Active Server receives the
same data by means of replication from the Primary/Active Server. The server stores the flight
plan information in a database for retrieval by the Client workstations.
The Server workstations hosts a number of client workstations located at traffic management
positions on the TRACON control floor and client workstations at remote ATC facilities (such as
other towers and en route facilities) over the FTI network. An Ethernet network provides
connectivity between the servers located in the TRACON equipment room and the user client
workstations located at ATC and/or TMU positions.
xx/xx/2011 JO 6131.5, CHG 1
2-6
The ARMT server is transparent to the user. It manages the users, stores data, and supports the
ARMT client workstations. Server access is primarily limited to AT or field maintenance system
administrators via user log-in credentials.
Installed in the Server Workstation is:
a. RS-422 Serial Communications Card. The RS-422 communications card is a four
port Peripheral Component Interconnect (PCI) serial card. The RS-422 ports allow the
servers to communicate with the EFSTS. This card must be configured to use RS-422
communications after installation.
b. Ethernet 10/100 LAN Card (NIC), Server workstations are deployed with two or
three NICs to support data communication with external NAS communications
services (such as FTI). Server network interface cards are installed based upon
specific site operational requirements. Server NIC configurations include, but are not
limited to, the following:
(1) The first NIC is used for NAS Operational communications with ARMT satellite
positions.
(2) The second NIC communicates with the CARTS Gateway (AGW) or STARS
Applications Interface Gateway (AIG) depending on what type of terminal
automation system is used at the TRACON.
(3) The third NIC is used for data communications between ARMT and the Surface
Movement Advisor (SMA) NAS interface, which is only installed at Atlanta
TRACON (A80).
Connected to the Servers are:
c. External Hard Drive. The external hard drive is connected to the Primary Server only
and is used to store backup, archive and storage of ARMT site data.
d. UPS. See detailed description below.
e. Network Switch Module and Optional Network devices. See detailed description
below.
f. A/B Switch. Both the ARMT Primary Server Workstation and Backup Server
Workstation receive EFSTS data through an RS-422 connection to the EFSTS system.
The connection from EFSTS to ARMT is a single cable that terminates at the ARMT
A/B Switch. The A/B Switch serves two purposes. First, it acts as a “Y” splitter for the
feed from EFSTS. This allows both ARMT servers to receive the EFSTS data
simultaneously. Second, the A/B switch designates which ARMT server communicates
back to EFSTS.
ARMT has the capability to send strip print messages to EFSTS that allows automatic
strip printing for handoffs. For instance, when an aircraft moves form the tower
airspace to the TRACON air space, ARMT can send a print strip command to EFSTS.
EFSTS then prints the flight strip at a specific printer in the TRACON. Only one
ARMT server can send print strip messages to EFSTS. However, both ARMT servers
will transmit the print strip command to EFSTS. The ARMT A/B Switch connects the
transmit pin in the RS-422 cable to the selected server (A=primary/B=backup).
xx/xx/2011 JO 6131.5, CHG 1
2-7
Facilities that do not use the ARMT strip printing capabilities still require the ARMT
A/B Switch so that the EFSTS data will reach both ARMT servers.
204. ARMT Client workstation. The ARMT clients display airport data received from the
server. Client workstations provide the user access to the system. ARMT clients use a Windows
Operating system and installed is FAA-developed ARMT application and related applications,
COTS software including antivirus, MS Office Professional that are pre-loaded to computers by
the program office prior to installation. No other COTS software applications are authorized on
ARMT servers or clients.
The servers provide EFSTS data used by ground controllers at the tower cab to display the taxi
list. When strips are scanned at EFSTS ground control scanners, this data is used for the taxi list
that is the cornerstone of the ARMT functions for managing departures.
User and system administrator access to ARMT client workstations is accomplished via login
with user identification and password.
Installed in the Client Workstation is:
a. Ethernet 10/100 LAN Card (NIC), Client workstations use one NIC to communicate
with the servers at the TRACON.
Connected to the Client Workstation is:
a. Network Switch Module and Optional Network devices. See detailed description
below.
b. Network Laser Printer. The network laser printer is used to print out reports
generated by ARMT.
c. Speakers. At ATCT sites only.
205. Uninterruptible Power Supply (UPS). An UPS is required to be connected to each of
the server and client workstations because the ARMT system is not certified to be on critical
power. The UPS connects to the computer USB port and provides information, such as battery
time remaining to allow the software to automatically shut down before complete loss of power.
206. Network Module Switch (Ethernet Switch). The network module switch provides
connectivity from the ARMT server to the ARMT client network. The minimum requirement is
a 16 port 10/100 Mbps switch with an optional fiber card switch module. The number of ports is
dependent on the number of positions at the facility.
a. Optional Fiber Switch Module. This optional fiber card switch module is only used
in conjunction with the network switch, and only if there is more than one switch and
they are located more than 100 meters from each other. This module allows for a
Standard Connector (SC) fiber connection between two switches to enable extended
Transmission Control Protocol/Internet Protocol (TCP-IP) communication.
b. Optional Ethernet Extender (CAT5e extender). This optional CAT5e Extender is
used only in facilities when the distance between ARMT network switches exceds the
maximum length of CAT5e limitation requirements (100 meters).
xx/xx/2011 JO 6131.5, CHG 1
2-8
207. Domain Controller. The ARMT network Domain Controller Server that is located at
the William J Hughes Technical Center. Domain controller server access is privileged,
accomplished via authorized System Administrator log-in with user identification and password.
The Domain Controller is connected to the ARMT FTI network. All ARMT client and server
workstations are members of the ARMT Domain. The ARMT Domain Controller authenticates
all local and remote user logons for the ARMT network.
The ARMT Domain Controller runs the Computer Associates Integrated Threat Management
(ITM) Server. All ARMT client and server workstations run the ITM client and receive
Antivirus and Spyware definitions from the ARMT Domain Controller. Additionally, all ITM
clients report all ITM events (errors, updates, and threats found) to the ARMT Domain
Controller. Second level engineering support team, via Super System Administrator functions,
access security and event logs to conduct audit log reviews daily.
The ARMT network utilizes a Windows 2008 Domain Controller (DC) and Windows 7
Workstations. The ARMT Domain Controller was implemented in 2010 to respond to security
authentication requests (logging in, checking permissions, etc.) within the ARMT Domain. The
ARMT DC applies ARMT system security settings across the domain client systems using group
policy.
The ARMT Domain Controller logs the following events:
Account logon events,
Account management, Directory Service Access,
Logon events,
Object access,
Policy change,
Privilege use,
Process tracking, and
System events.
These events are logged with the Windows Event Monitor in the System, Application, and
Security logs. Each of the logs is set to a maximum file size of 16384 MB and the logs are
rotated when full and/or on a scheduled basis. When the logs are rotated, they are renamed to
Archive_logname_date_time and then once a month the archived logs are moved by the system
to a local network storage drive. National procedures, processes, configuration and other domain
controller documents published by the ARMT program office and retained by Second Level
Engineering at WJHTC.
The ARMT Domain Controller is backed up daily to a network hard drive. A complete system
image is made using Norton Ghost. An archive of the last fourteen backups (two weeks) is
maintained on the network hard drive, external drives store archives for up to a year. The
domain controller also hosts anti-virus and malicious code software (Computer Associates
xx/xx/2011 JO 6131.5, CHG 1
2-9
ITM/e-Trust Threat Management Agent) and is used to support quarterly software updates for
security and COTS software applications via remote access to site server and client workstations.
Domain controller system administrator functions are managed by AJT-145 ARMT program
office support team members at the WJHTC only. Field maintenance personnel are not provided
access to ARMT Domain Controller assets. Only authorized ARMT AJT-145 System
Administrators (Super SAs) have access to ARMT Domain Controller software and
configuration settings via established written ARMT user access account management forms and
approval processes. For more information about the ARMT Domain controller, contact the
ARMT program office.
208. – 299. Reserved.
This Page Intentionally Left Blank
10/14/2011 JO 6131.5, CHG 1
3-1
Chapter 3. Standards and Tolerances
300. General. This chapter prescribes the standards and tolerances for ARMT as defined and
described in Order 6000.15. All key performance parameters and/or key inspection elements are
clearly identified by an arrow () placed to the left of the applicable item.
STANDARDS AND TOLERANCES
Parameter Reference
Paragraph Standard
Tolerance/Limit
Initial Operating
301. ARMT
a. Active Server
(normally the Primary
Server Workstation)
TI 6131.15
Par. 6.2.2
ARMT server software receives
data from external interfaces
and the data is accessible at the
client workstation.
Same as
Standard
Same as
Standard
b. Non-Active Server
(Normally the Backup
Server Workstation)
TI 6131.15
Par. 6.2.2
ARMT server software receives
data from the primary server.
The data is accessible at the
client workstation.
Same as
Standard
Same as
Standard
c. ARMT Client
Workstation
d. Anti-Virus is
operating properly on
workstations.
e. Anti-Virus license is
active
f. UPS
TI 6131.15
Par. 6.2.1
TI 6131.15
Par. 6.2.5
TI 6131.15
Par. 6.2.5
TI 6131.15
Par. 6.2.4
ARMT Client workstation
receives and displays data from
the server
The Anti-virus software is
providing real-time protection,
scanning daily, and any
malicious code found is
cleaned, quarantined, or deleted
.
License is active and that
quarterly software updates are
installed and operational
Replace Battery icon is not
displayed
Same as
Standard
Same as
Standard
Same as
Standard
Same as
Standard
Same as
Standard
Same as
Standard
Same as
Standard
Same as
Standard
302. – 399. Reserved.
10/14/2011 JO 6131.5, CHG 1
4-1
Chapter 4. Periodic Maintenance
400. General. This chapter establishes all the maintenance activities that are required for
ARMT on a periodic, recurring basis and the schedules for their accomplishment. The chapter is
divided into sections. One identifies the performance checks (tests, measurements, and
observations) of normal operating controls and functions, which are necessary to determine
whether operation is within established tolerances/limits. Another section identifies other tasks
that are necessary to prevent deterioration and/or ensure reliable operation.
Note: All reference paragraphs pertaining to standards and tolerance/limits are found in
chapter 3 unless otherwise stated. The TI references are to TI 6313.15, Airport Resource
Management Tool (ARMT).
401. – 429. Reserved.
Section 1. Performance Checks
Performance Checks
Reference Paragraph
Standards &
Tolerances
Maintenance
Procedures
430. DAILY
a. ARMT Client Workstation(s)
1) ARMT status indicator shows green*
2) Verify Anti-Virus software is scanning
daily and all external media (USB
memory, CDs, etc.) is scanned when
ported to any ARMT workstation.
301.c.
301d.
TI 6131.15 Par
6.2.1
TI6131.15 Par.
6.2.5.a. - d
b. ARMT Server Workstations
1) ARMT Server is receiving data from
external interfaces and the data is
accessible at the client workstation.
2) Verify Anti-Virus software is scanning
daily and all external media (USB
memory, CDs, etc.) is scanned when
ported to any ARMT workstation.
301.a. and 301.b.
301.d
TI 6131.15 Par
6.2.2.
TI6131.15 Par.
6.2.5.a. – d.
4-2
Section 1. Performance Checks - Continued
Performance Checks
Reference Paragraph
Standards &
Tolerances
Maintenance
Procedures
431. MONTHLY
a. ARMT Client Workstation(s)
Uninterruptible Power Supply (UPS)
b. ARMT Server Workstation(s)
Uninterruptible Power Supply (UPS)
Provides an uninterruptable power source to
connected equipment.
c. Perform Primary and Backup Server
Switchover
301.e
301.e
ARMT functions
properly on Backup
Server.
TI 6131.15 Par. 6.2.4
TI 6131.15 Par. 6.2.4
TI 6131.15 Par.
6.2.3
432. QUARTERLY
a. External hard drive is functional and
accessible from the server (Primary server
workstation only).
TI 6131.15 Par .
6.2.6
* Note: A sample Memorandum of Agreement (MOA) is provided in the ARMt technical
Instruction Book (TI 6313.15) for sites to established shared responsibility for this task with
designated air traffic management personnel.
433. – 479. Reserved.
4-3
Section 2. Other Maintenance Tasks
Maintenance Tasks
Reference Paragraph
Standards &
Tolerances
Maintenance
Procedures
480. QUARTERLY
a. Clean ARMT Client and Server
Exterior
b. Confirm the Antivirus software is
licensed and quarterly software
updates are installed
c. Conduct group access account
reviews to verify individuals
included in USER and ADMIN
groups.*
Par. 301.e
None
TI 6131.15 Par.
6.2.5.a, e.
TI 6131.15 Par.
6.3.2
* Note: A sample Memorandum of Agreement (MOA) is provided in the ARMt technical
Instruction Book (TI 6313.15) for sites to established shared responsibility for this task with
designated air traffic management personnel.
481. – 490. Reserved.
4-4
Section 3. Special Maintenance Tasks
Maintenance Tasks
Reference Paragraph
Standards &
Tolerances
Maintenance
Procedures
491. AS REQUIRED
a. Ping Server from Client
b. Test Flight Strip Scan Function
Successful ping
response
ARMT receives data
from EFSTS
TI 6131.15 Par.
6.4.1
TI 6131.15 Par.
6.4.2
492 – 499. Reserved.
xx/xx/2011 JO 6131.5
5-1
Chapter 5. Maintenance Procedures
500. Purpose. This chapter establishes the procedures for accomplishing the various essential
maintenance activities that are required for ARMT on either a periodic or incidental basis. The
chapter is divided into three sections. The first section describes the procedures to be used in
making the performance checks listed in chapter 4, section 1. The second section describes the
procedures for doing the tasks listed in chapter 4, section 2. The third section describes the
procedures for doing special tasks, usually nonscheduled and not listed in chapter 4.
501. Technical Performance Record Entries. Order 6000.15 contains guidance and detailed
instructions for field utilization of FAA Form 6000 series, as applicable to ARMT.
https://intranet.faa.gov/faaemployees/org/linebusiness/ato/operations/technical_operations/ajw16
3/6000.15/Appendix4_index.cfm
For ARMT equipment there is no requirement to record key performance parameters on a
Technical Performance Record (TPR).
502. – 519. Reserved.
xx/xx/2011 JO 6131.5
5-2
Section 1. Performance Checks
520. General. The Performance check procedures can be found in TI 6131.15 Chapter 6.
521. – 549. Reserved.
xx/xx/2011 JO 6131.5
5-3
Section 2. Other Maintenance Tasks
550. General. Other maintenance task procedures can be found in TI 6131.15 Chapter 6.
551. Security and System Administration Procedures.
a. Generally these responsibilities include special maintenance and reporting tasks,
including but not limited to, the following:
(1) Management and administration of operating system and application user
accounts, preparation, completion and retention of ARMT User Access Account
Request forms (UAF), generation of on-demand user account lists for
verification/validation and inspection.
(2) Review and reporting of security events logs and security incident reporting.
(3) Ensuring that security-related confirmation management processes are adhered to,
including verification that security patches, security software and other applications are
installed and operating correctly.
b. Refer to the ARMT Security & System Administration Procedures Handbook for a
description of special maintenance tasks assigned to designated site automation system
maintenance managers/personnel.
c. The ARMT Security & System Administration Procedures Handbook document is
available from ARMT client and server workstations in the ARMT Resources folder and/or from
the ARMT Program Office.
552– 569. Reserved.
xx/xx/2011 JO 6131.5, CHG 1
5-4
Section 3. Special Maintenance Tasks
570. General. Special maintenance task procedures can be found in TI 6131.15 Chapter 6.
571. – 599. Reserved.
5-5
This Page Intentionally Left Blank
10/14/2011 JO 6131.5
6-1
Chapter 6. Flight Inspection
600. Flight inspection is not required for the ARMT System.
601 – 699. Reserved.
This Page Intentionally Left Blank
10/14/2011 JO 6131.5
7-1
Chapter 7. Glossary
700. Abbreviations and Acronyms.
AFAAR Technical Operations Aircraft Accident Representative
AGW ARTS Gateway
AIG Applications Interface Gateway
APReq Approach Request
ARMT Airport Resource Management Tool
ARTCC Air Route Traffic Control Center
ARTS Automated Radar Terminal Systems
ASH Office of Safety & Hazardous Material
AT Air Traffic
ATC Air Traffic Control
ATCT Air Traffic Control Tower
ATO Air Traffic Organization
ATSS Airway Transportation System Specialist
COTS Commercial Off-the-Shelf
EFSTS Electronic Flight Strip Transfer System
FAA Federal Aviation Administration
FACID Facility Identification
FDRS Flight Data Remoting System
FTI FAA Telecommunications Infrastructure
IAW In Accordance With
KSN Knowledge Sharing Network
LRU Lowest Replaceable Unit
NAPRS National Airspace Performance Reporting System
NAS National Airspace System
NASA National Aeronautics and Space Administration
NIC Network Interface Card
OCC Operations Control Center
OPS Operations
PC Personal Computer
PCI Peripheral Component Interconnect
SA System Administrator
SC Standard Connector
SMA Surface Movement Advisory
SSC System Support Center
STARS Standard Terminal Automated Replacement System
TCP-IP Transmission Control Protocol/Internet Protocol
TFOS Terminal Field Operational Support
TPR Technical Performance Record
TRACON Terminal Radar Approach Control facility
UAF User Access Form
UPS Uninterruptible Power Supply
10/14/2011 JO 6131.5
7-2
WJHTC William J. Hughes Technical Center
This Page Intentionally Left Blank
10/14/2011 JO 6131.5
A-1
Appendix A. Field Support Information
Interruptions to ARMT equipment must be reported to Second Level Support at the William J.
Hughes Technical Center (WJHTC) during normal business hours.
To obtain Second Level support for the installation, maintenance, or software troubleshooting for
the ARMT system, use the following contacts.
TABLE A-1. SECOND LEVEL SUPPORT POINT OF CONTACT LIST
ARMT Technical
Lead/TFOS Software Lead
at WJHTC
Brian Schell
Phone: (609) 485-8624
Cell: (202) 409-2959
System Specialist
(Hardware)
System Specialist (Backup
Data)
Dan Costello
Phone: (609) 485-5041
System Hardware, Depot,
Warranty Support
Michael Howard
Cell: (443) 790-3075
ARMT Application
Software
Dan Costello
Phone: (609) 485-5041
Paul Blankenship
Phone: (609) 485-9892
Mike Everland
Phone: (609) 485-8080