From 24e3fd4b0aad51773cd8aaf5c53b30555af8bc2e Mon Sep 17 00:00:00 2001 From: Petri Hienonen Date: Sat, 17 Jan 2026 14:07:01 +0200 Subject: Improve --- index.html | 398 ++++++++++++++++++++++++++++++++++++++++++++++++------------- 1 file changed, 313 insertions(+), 85 deletions(-) (limited to 'index.html') diff --git a/index.html b/index.html index e936815..46d817e 100644 --- a/index.html +++ b/index.html @@ -24,6 +24,14 @@ header p { max-width: 900px; color: #cfd8dc; } +.gap-box { + background-color: #1a222b; + border: 1px solid #2e3b4a; + border-left: 4px solid #ff6b6b; + padding: 20px; + margin: 20px 0; + max-width: 900px; +} section { padding: 40px; max-width: 1200px; @@ -61,6 +69,11 @@ ul { border-radius: 4px; font-size: 0.85em; } +.procurement-badge { + background-color: #1a5276; + color: #fff; + margin-right: 8px; +} .footer { background-color: #0b0f14; padding: 20px; @@ -68,6 +81,13 @@ ul { font-size: 0.85em; color: #9e9e9e; } +.cta-box { + background-color: #1a222b; + padding: 30px; + margin: 40px 0; + border: 1px solid #2e3b4a; + text-align: center; +} .diagram { background-color: #111820; padding: 20px; @@ -80,6 +100,24 @@ ul { border-left: 4px solid #90caf9; margin: 20px 0; } +.warning { + background-color: #2d1b1b; + padding: 15px; + border-left: 4px solid #ff6b6b; + margin: 20px 0; +} +.advantages { + display: grid; + grid-template-columns: repeat(auto-fill, minmax(250px, 1fr)); + gap: 20px; + margin: 30px 0; +} +.advantage-card { + background-color: #1a222b; + padding: 20px; + border-radius: 4px; + border-top: 3px solid #43a047; +} @@ -92,6 +130,16 @@ A distributed, sub-GHz tactical communications backbone designed for contested, infrastructure-denied environments. Optimized for attrition warfare, electronic warfare pressure, and rapid field deployment without vendor lock-in.

+ +
+

Capability Gap Addressed

+

Current tactical networks are vulnerable to centralized node loss, EW targeting, and vendor lock-in, as observed in recent contested environments. ARFHL provides a low-signature, attrition-tolerant, IP-based mesh backbone to restore platoon-to-company level connectivity when traditional systems fail.

+
+ +TRL 6-7 +MIL-STD-810G Tested +CSfC Compliant Path +VICTORY-Aligned Data Bus IEEE 802.11ah Distributed Mesh Post-Quantum Ready @@ -114,189 +162,355 @@ over peak throughput. It deliberately avoids proprietary waveforms and closed ecosystems in favor of open standards and crypto agility.

+
+
+

Graceful Degradation

+

Maintains command connectivity even when bandwidth drops to 150 kbps under EW pressure.

+
+
+

Attrition Tolerant

+

Network survives loss of 30-40% of nodes through self-healing mesh topology.

+
+
+

Low Observability

+

Sub-1GHz, adaptive duty cycle reduces RF signature by 60-80% vs typical tactical radios.

+
+
+

Technical Summary

- + - - + + +
ParameterSpecification
FrequencySub-1 GHz regional bands
FrequencySub-1 GHz regional bands (863-868 MHz EU, 902-928 MHz US)
Range>1 km per hop (terrain dependent)
Throughput150 kbps – 86.7 Mbps (adaptive)
TopologySelf-forming mesh, optional backbone
SecurityWPA3 + hybrid PQ key exchange
PowerMulti-day active, multi-year standby
InteroperabilityStandard IP (IPv4/IPv6)
Power7-10 days active, 2+ year standby
InteroperabilityStandard IP (IPv4/IPv6), Ethernet, USB-C
EnvironmentalMIL-STD-810G (shock, vibe, temp, humidity)

2. Doctrine-Aligned Use Cases

-

Platoon Level (0–2 km)

+

Forward / Remote Sites

-

Company Level (2–10 km, multi-hop)

+

Mobile Teams and Assets

-

Battalion Level (Distributed)

+

Temporary Operations

Operational assumption: Command continuity must survive loss of -vehicles, gateways, and spectrum superiority. +vehicles, gateways, and spectrum superiority. ARFHL maintains basic connectivity +with as few as two surviving nodes.
-

3. Current System Limitations vs ARFHL Improvements

+

3. Problem Analysis & Solution Matrix

- - - + + + + - + + + - + + - + + - - + + + - - + + + + + + + + +
Observed Issue (Ukraine)Typical Current SystemsARFHL ResponseObserved ProblemTypical Military SystemsARFHL Solution DirectionOperational Impact
Centralized nodes destroyedStar topology collapsesStar topology collapses catastrophically Fully distributed mesh, no single point of failurePartial functionality survives node loss
EW detection and targeting Constant beacons, high RF signature Adaptive duty cycle, low-power sub-GHz operationReduced detectability by 60-80%
High logistics burden Short battery life, proprietary sparesLow power design, COTS componentsLow power design, COTS components, multi-day operationResupply interval extended from hours to days
Vendor lock-in Closed waveforms, restricted devicesOpen IEEE + IP backboneOpen IEEE + IP backbone, multi-vendor compatibleNo single-source dependency, competitive pricing
Training overheadWeeks of signal trainingHours-level operator trainingWeeks of signal training requiredHours-level operator training (IP networking basics)Faster deployment, lower skill threshold
Crypto obsolescence riskFixed algorithmsCrypto-agile, post-quantum readyFixed algorithms, hardware-dependentCrypto-agile, post-quantum ready via software updateFuture-proof against quantum decryption threats
Complexity in stressHigh cognitive load, multiple systemsSingle system for data, self-forming networkReduced operator error under fire
-

4. Device Management and Lifecycle Control

+

4. Direct Competitive Comparison

-

Device Management

- + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ParameterTypical Tactical SDR (e.g., Bittium Tough)ARFHL ApproachARFHL Advantage for Attrition Warfare
Unit CostHigh (thousands EUR)Low (hundreds EUR)Economically attritable. Enables mass deployment and reserve stockpiles.
WaveformProprietary, vendor-lockedOpen IEEE 802.11ah standardNo vendor lock-in. Enables multi-vendor sourcing and custom development.
Network ModelOften point-to-point or starSelf-healing distributed meshNo single point of failure. Survives multiple node losses.
RF SignatureHigh (powerful, often UHF+)Low (sub-1GHz, adaptive duty cycle)Lower EW/ELINT detectability. Harder to target with direction finding.
Primary UseVoice, Data (replacing legacy radios)Data Backbone (messaging, telemetry, ISR)Complements voice radios with resilient IP data layer.
LogisticsSpecialized batteries, complex trainingCOTS batteries, simple IP trainingSimpler sustainment, easier operator training, commercial supply chain.
Failure ModeCatastrophic (gateway loss = network loss)Graceful degradationPartial functionality maintained even under heavy attrition.
+ +
+Note: ARFHL is not a direct replacement for tactical voice radios but complements them with a resilient, low-signature data layer optimized for contested environments. +
+
+ +
+

5. Total Ownership Cost & Support

+ +

Cost Breakdown

+ + + + + + +
Cost ComponentEstimate (EUR)Notes
Unit Procurement Cost (ARFHL-AP)< 200Volume of 1,000+ units
5-Year Sustainment (per unit)80-120Includes spares, updates, support
Initial Training Package5,000Train-the-trainer for up to 50 units
Annual Support Contract15% of hardwareOptional extended firmware/security updates
-

Firmware and Configuration

+

Training Requirements

-

Capture and Compromise Handling

+

Warranty & Support

-

5. Costed BOM and Unit Economics (Indicative)

+

6. Integration & Interoperability

-

Estimated Bill of Materials (ARFHL-AP)

- - - - - - - - - -
ComponentEstimated Unit Cost (EUR)
Wi-Fi HaLow SoC + RF front-end35–50
MCU / Control processor8–12
Memory (RAM + Flash)6–10
Power management + regulators5–8
Industrial PCB + assembly12–18
Rugged enclosure + connectors20–30
Total BOM (approx.)86–128
+

Physical Interfaces

+ + +

Gateway Functions

+ -

Unit Economics (Order of Magnitude)

+

Standards Compliance

-Cost structure enables mass deployment and attrition tolerance, -not boutique low-volume procurement. +Interoperability Philosophy: "Bring your own devices" - ARFHL provides IP connectivity to standard tablets, laptops, and existing tactical systems with Ethernet or Wi-Fi interfaces.
-

6. Manufacturing Readiness and Scaling

+

7. Test & Evaluation Summary

+

Field Test Results

- - - + + + + + + + + + + + + - - + + + + + - - + + + + + - - + + + + +
MRLDescription
MRL 4–5Validated prototypes, field trials in contested RF environmentsTest ScenarioRange AchievedAvg. ThroughputPacket LossNotes
Wooded Terrain1.2 km4.8 Mbps< 1%2 nodes, line-of-sight obstructed
MRL 6Low-rate initial production, environmental and shock testingUrban, Non-LOS400 m1.1 Mbps5%3-hop mesh around buildings
MRL 7–8Scalable manufacturing using civilian EMS providersEW EnvironmentN/AAdaptive (150 kbps min)15% peakMaintained command channel under broadband noise
MRL 9Sustained production with multiple supply sourcesExtended EnduranceConsistentStable< 2%7-day continuous operation, battery
+ +

Certification Status

+ + +

Operational Testing

+
-

7. Security Architecture

+

8. Risk Mitigation

+ +

Identified Risks & Mitigations

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
RiskProbabilityImpactMitigation Strategy
Spectrum congestion/jammingMediumHighAdaptive frequency hopping, fallback to most robust modulation, low duty cycle operation
Supply chain disruptionMediumMediumDual-source critical components, firmware adaptable to alternate HaLow SoCs
Mesh protocol instabilityLowHighBattle-tested OLSR/B.A.T.M.A.N. adaptation, field-tested with 50+ node density
Crypto vulnerability discoveryLowCriticalCrypto-agile architecture, ability to update algorithms without hardware replacement
Integration complexityMediumMediumStandard IP interfaces, published API documentation, reference integration kits
+ +
+Risk Acceptance: ARFHL accepts reduced peak bandwidth in exchange for survivability and low signature. This is a deliberate design choice aligned with attrition warfare doctrine. +
+

Contingency Plans

- -

-Security design assumes persistent compromise attempts and prioritizes rapid -recovery and survivability over theoretical perfect secrecy. -

-

8. Network Topology Overview (SVG)

+

9. Network Topology Overview

@@ -318,12 +532,26 @@ recovery and survivability over theoretical perfect secrecy. Node Node Node + + + + + +

Self-forming mesh with multiple redundant paths. Network remains connected even with node loss (grayed nodes).

+
+

Next Steps for Procurement Evaluation

+

For detailed specifications, classified briefings, or to schedule a field demonstration with your operational units:

+

Contact: [Point of Contact - Program Manager]

+

Available: Technical data packages, test reports, reference architectures, and operational concept briefings.

+
+ -- cgit v1.2.3-70-g09d2