DON26BZ02-DV052 — Non-tactical Replacement of AN/UYK-43 in a Laboratory Environment
Award Maximum: $2,000,000 Period of Performance: 36 months (Base: 12 months / Option 1: 12 months / Option 2: 12 months) Phase Type: Direct-to-Phase-II (D2P2)
OBJECTIVE: Develop a non-tactical replacement for the UYK-43 computer system to ensure land-based testing remains viable for Aegis computer programs before deployment on board ships.
DESCRIPTION: The AN/UYK-43 (UYK-43) computer system is used to run certain baselines of the Aegis computer program. The UYK-43 is no longer manufactured. Operational UYK-43's and spare parts are prioritized for operational fleet use and not testing. The Navy needs a replacement for the UYK-43 to enable land-based testing as there is no commercially available computer that is compatible with or emulates the UYK-43.
The solution must be binary compatible, provide compatible input/output capabilities, and have equivalent performance to the UYK-43. The computer programs of the Aegis Weapon System are commonly described as real-time embedded computer software. To ensure compatibility with the real hardware and guarantee that computer programs tested on the emulator work aboard ship, the input/output latency and throughput, memory and persistent storage capacity, and instruction timing must be matched precisely.
Compiler Monitor System (CMS)-2Y is a computer software language developed for tactical operations for Fleet Computer Programming Center - Pacific (FCPCPAC) to support Naval Tactical Data Systems (NTDS) operations. The language continues to be developed in use, eventually supporting several combat system computers including the UYK-43 which became the standard 32-bit computer of the Navy for surface ship and submarine platforms.
The solution will develop an emulator of the UYK-43, using open-source code and Commercial Off-the-Shelf (COTS) hardware to facilitate testing critical updates of Aegis ships operating with CMS-2Y tactical code. The emulator must execute the 32-bit CMS-2Y tactical code on a COTS computer system running a common operating system. The translated CMS-2Y code must perform similarly to UYK-43 to support various test requirements and scenarios in a laboratory environment. The emulation will be evaluated in a Navy land-based test facility using operational data to verify and validate emulator functionality.
Work produced in Phase II may become classified. Note: The prospective contractor(s) must be U.S. owned and operated with no foreign influence as defined by 32 U.S.C. § 2004.20 et seq., National Industrial Security Program Executive Agent and Operating Manual, unless acceptable mitigating procedures can and have been implemented and approved by the Defense Counterintelligence and Security Agency (DCSA) formerly Defense Security Service (DSS). The selected contractor must be able to acquire and maintain a secret level facility and Personnel Security Clearances. This will allow contractor personnel to perform on advanced phases of this project as set forth by DCSA and NAVSEA in order to gain access to classified information pertaining to the national defense of the United States and its allies; this will be an inherent requirement. The selected company will be required to safeguard classified material during the advanced phases of this contract IAW the National Industrial Security Program Operating Manual (NISPOM), which can be found at Title 32, Part 2004.20 of the Code of Federal Regulations.
PHASE I: For a Direct to Phase II topic, the Government expects that the small business would have accomplished the following in a Phase I-type effort and developed a concept for a workable prototype or design to address, at a minimum, the basic requirements of the stated objective above. The below actions would be required in order to satisfy the requirements of Phase I:
Developed a concept UYK-43 emulator
Demonstrated the concept meets all parameters in the Description.
Demonstrated feasibility in meeting the requirements in the Description to support the test and operational environments.
Feasibility established through analysis and modelling.
FEASIBILITY DOCUMENTATION: Offerors interested in participating in Direct to Phase II must include in their response to this topic Phase I feasibility documentation that substantiates the scientific and technical merit and Phase I feasibility described in Phase I above has been met (i.e., the small business must have performed Phase I-type research and development related to the topic NOT solely based on work performed under prior or ongoing federally funded SBIR/STTR work) and describe the potential commercialization applications. The documentation provided must validate that the proposer has completed development of technology as stated in Phase I above. Documentation should include all relevant information including, but not limited to: technical reports, test data, prototype designs/models, and performance goals/results. Work submitted within the feasibility documentation must have been substantially performed by the offeror and/or the principal investigator (PI). Read and follow all of the DON SBIR Direct to Phase II Broad Agency Announcement (BAA) Instructions. Phase I proposals will NOT be accepted for this topic.
PHASE II: Develop, demonstrate, validate, and deliver a prototype UYK-43 emulator based on the results of Phase I. The application will be implemented in an existing Government-approved and provided modeling and simulation environment to validate performance. It will be evaluated by Government subject matter experts for validation.
It is probable that the work under this effort will be classified under Phase II (see Description section for details).
PHASE III DUAL USE APPLICATIONS: Support the Navy in transitioning the prototype UYK-43 emulator to allow for further experimentation and refinement. The prototype emulator will be incorporated into the testing for Aegis baseline modernization process. This will consist of integration into a baseline definition, incorporation of the baselines existing and new threat capabilities, validation testing, and combat system certification.
Computer science and computer engineering professions will benefit from learning to make computer programs written for legacy computer systems run on modern instruction set architectures; learning how to ensure timing of computer programs is maintained on a foreign computer architecture; learning to ensure input/output is compatible between legacy and modern computers.