Skip to main content

C4ISR - Joint Strike Mission Computer

C4ISR MISSION CRITICAL VIRTUAL COMPUTER

  


Blue bar
1. Unparalleled Parallel Computing 

 - this is how it works 
 

In fact, C4ISR incorporates every army function and operation. It determines faster speed, better resolutions and decisive actions- making it the key to mission success.
We want to synergize tactical, operational, and strategic performance. Information and data flowing through multiple systems  must be received and disseminated by the commander timely and accurately. 

Harnessing information and data as new source of powerful weapon has become crucial nowadays. And real-time reaction is vital. That's why 7StarLake's Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) solutions emphasize on ultra-high performance system integration. We focus on the capabilities to control - because control lead to dominance.

C4ISR

 

AV800-D27 & THOR 11-D27​​​​​​ are equipped with Ultra-High Performance Intel® Xeon® D-2796NT CPU. In a scenario where virtual machine is integrated with C4ISR system, the 20-core processor allows the CPU resources be reallocated to one or more virtual machines. For instance, four cores are assigned to one virtual machine would mean the user now has maximum four different operating systems running on the same physical computer at the same time. 

In this way, IT operators will no longer be disturbed by numerous interfaces, monitors and humongous servers. Various and complex system connecting one another should work coordinately, interpreting the received data and representing the commander's order.

All data and assets can be managed from one location. Ideal hardware utilization, expansion potentials and high efficiency operation are further guaranteed. In battlefield reality, where one second difference defines success and failure, the application of virtualization machine has become indispensable.

We want to synergize tactical, operational, and strategic performance.  Therefore, information and data flowing through multiple systems must be received by the commander timely and accurately; same as those to be disseminated.

 

 


Blue bar
2. Virtual Machine Application 

Our aim is to enhance tactical, operational, and strategic performance through synergy. To achieve this, information and data flowing through multiple systems must be received by the
commander promptly and accurately, just as they are disseminated.

 

The increasing adoption of Virtual Machine technology by organizations and enterprises isn't solely driven by the reduction of physical hardware and the expansion potentials it offers. Indeed, both authorities and private sectors are turning to virtual machines because they provide users with numerous options for running operating systems in constrained environments. Essentially, the utilization of virtual machines effectively saves costs and achieves ultra-high efficiency. 

Take SR800 & HORUS200 for example, the CPU resources of their 16-core
Ultra-High Performance Intel® Xeon® D-1587 processor can be allocated to one or more virtual machines. Various operating systems can thus run at the same time, without having to adopt extra physical hardware and server. Meanwhile, all data and assets can be managed from one location. It achieves an ideal hardware utilization and lead to unlimited expansion potentials, which undoubtedly are the keys to mission success.

01

Take AV800-D27 & THOR11-D27 for example, the CPU resources of their 20-core Ultra-High Performance Intel® Xeon® D 2796NT processor can be allocated to one or more virtual machines. Various operating systems can thus run at the same time, without having to adopt extra physical hardware and server. Meanwhile, all data and assets can be managed from one location. It achieves an ideal hardware utilization and lead to unlimited expansion potentials, which undoubtedly are the keys to mission success.

pic

Virtual machines offer more than just cost savings on hardware and energy expenses. Nowadays, enterprises are also leveraging their secure virtual environments. Unlike physical servers, damage to a virtual machine doesn't affect the physical server, ensuring quick disaster recovery. Furthermore, when operating systems run in a virtual environment, the license key required by the virtual OS matches that of the hard drive ID. This makes virtual machines an ideal option for system testing and software licensing. While fulfilling these functions, virtual machines also ensure forward compatibility and support for legacy operating systems. The robust capabilities of virtual machines make them an unparalleled choice for significant data computing tasks.

 


Blue bar
3. MIL-STD 1275/461 - Power Supply with Voltage Transient Protections

SK711

the power board adopted by AV800-D27 & THOR11-D27, supports input range from 18V to 36V. Possessing military standard filter for EMI avoidance, SK711 guarantees a stability of voltage and electric current under system operation. It is especially suitable for application in military or other harsh environment.

517

Furthermore, with parallel design, two SK711 combining can generate double power of 300W, supporting prominent system performance. Compliant with MIL-STD 1275/461, DO-160F and extended operating temperature from -40 to 85°C, SK711 performs as an ideal converter module for severe environmental usage.

Its GAIA Hi-Rel DC/DC CONVERTER also provides Undervoltage Lockout (UVLO), Output Over Current Protection (OCP), Output Overvoltage Protection (OVP) and Over Temperature Protection (OTP) to made stability and safety. They module is compliant with MIL-STD-461 C/D/E/F Standards.

 

SK710

SK710, the power board adopted by SR800 & HORUS200, supports input range from 12V to 40V. Possessing military standard filter for EMI avoidance, SK710 guarantees a stability of voltage and electric current under system operation. It is especially suitable for application in military or other harsh environment.

SK710

Furthermore, with parallel design, two SK710 combining can generate double power of 150W, supporting prominent system performance. Compliant with MIL-STD 1275/461, DO-160F and extended operating temperature from -40 to 85°C, SK710 performs as an ideal converter module for severe environmental usage.

Its GAIA Hi-Rel DC/DC CONVERTER also provides Undervoltage Lockout (UVLO), Output Over Current Protection (OCP), Output Overvoltage Protection (OVP) and Over Temperature Protection (OTP) to made stability and safety. They module is compliant with MIL-STD-461C/D/E Standards.

002

 

Test Configuration

461

MIL-STD-461

is a military standard that establishes the
control of electromagnetic interference (EMI) emissions and susceptibility characteristics of electronic, electrical & electromechanical equipment and subsystems for military equipment.

EMI, or Electromagnetic Interference, refers to any unwanted signals or "noise" emitted by electronic devices. Maintaining control over EMI is paramount in military applications, as uncontrolled emissions could lead to detection by enemy forces, potentially resulting in significant losses. Designing a product to meet stringent requirements demands engineers with comprehensive expertise in both electrical and mechanical design. This ensures the prevention of unintended generation, propagation, and reception of electromagnetic energy, which could otherwise lead to adverse effects such as physical damage to operational equipment.

CE

 


Blue bar

4. Hardware Secure Erase - AES Encryption

 

Hardware Secure Erase

 

Under emergency situation, when written data needs to be erased immediately, a Secure Erase Button is indispensable. Instant Erase is a particular feature for SED (Self Encryption Drive). It is faster than Quick Erase to make all written data invalid. The encryption and decryption is controlled by an AES key on the path; once the AES key is replaced by a new one, the data becomes unrecognizable.

 
The Advanced Encryption Standard (AES) is one of the block cipher specification adopted by U.S. government. AES is enhanced and approved by the U.S. National Security Agency (NSA), and is now used worldwide.
Secure Erase-1

❶ Open the Protection cap
❷ Press button for destroyed SSD AES key
❸ Data/partition becomes unrecognizable

 

 High speed and low RAM 
 requirements  

The kind of cryptographic module can encrypt and decrypt rapidly on software and hardware with relatively less memory, thus is easier to practice and implement.

 Unbreakable Encryption
 Algorithms 

The larger size of key adopted, the more possible keys there are. Take 256-bit encryption for instance, it generates 2^256 possible keys, taking more years than the age of the universe (13.8 billion years) for hackers to break through.

 Perfectly Secure Environment 
 

AES Key is generated randomly through various rounds of algorithms. Each round consists of several processing steps, even the supplier and the user cannot access to the cypher. To date, AES encryption has never been broken in a way its predecessor DES (Data Encryption Standard) was way back in 1999.

Taking into consideration the strength, versatility, and speed of the cipher, AES Encryption is undoubtedly the best encryption program out there. To guard top-secret information, given the current state of technology, governments and the military select, and only use the AES Encryption.
 

 


Blue bar

5. NVMe U.2 Conduction Cooled Pack - MLC-SSD (2TB)

A Quantum Leap in Speed : NVMe Gen 4.0 x 4

In the world of NVMe interface architecture, a direct connection to the CPU is established through the PCIe interface, allowing for efficient memory-like access as data transactions exclusively follow the PCIe bus protocol. The Super High-Performance Gen 4.0x4 NVMe drive stands out with an impressive read/write speed of 7,880 MB per second, disrupting the conventional use of hard drives in SATA and SAS.

PCIe

nvmE

SSD

Rugged Conduction Cooled Pack

With increased speed and performance comes a higher generation of
heat which causing higher chance of malfunction. In environments
where active cooling is impractical, conventional removable SSD
cages struggle to cope with the elevated heat levels, particularly
from ultra-high capacity NVMe U.2 SSDs (up to 32TB per pack).
Enter the 7StarLake NVMe U.2 Conduction Cooled Pack—a
game-changer. Each U.2 SSD is equipped with its own standalone,
and anti-corrosive aluminum cooling pack. This innovative solution
efficiently redirects heat flow through thermal pads and heat-spreader.
The distinctive and high-efficiency modular design of the 7Star-
Lake solution distinguishes it from traditional storage alternatives,
ensuring exceptional thermal solution even in the face of the intense
heat generated by demanding processing tasks.

Resilient Against Extreme Pressures

In conjunction with its exceptional thermal management system, the ultra-compact Conduction Cooled Pack by 7StarLake boasts a carefully crafted enclosure meticulously tailored to accommodate U.2 SSD dimensions. This precise design ensures that U.2 SSDs remain impervious to vibrations and shocks, enhancing their durability across various scenarios including airborne missions, naval operations, or ground deployments. The precision-engineered enclosure provides an additional safeguard, fortifying the resilience and longevity of the U.2 SSDs even in the harshest and most challenging environments.

SSD破牆

SSD

Swappable CMOS Battery

A Quantum Leap in Speed : NVMe Gen 4.0 x 4 Rugged Conduction Cooled Pack In general, replacing the battery in a rugged solution can be complex and may compromise the original water and dust resistance function. However, the AV800-D27 addresses this issue with its easy-to-swap battery tray, enabling users to replace it directly. Simply pull the tray out fully from the computer to access the coin-cell battery. Replace it with a new CR2032 battery, push the tray back into the computer, lock the screw, and the replacement process is complete.