The Naval Sea Systems Command (NAVSEA) is issuing a Request for Information (RFI) to explore potential solutions for a Machinery Control System (MCS) intended for the LHA 10 Amphibious Assault Ship, currently contracted with Huntington Ingalls Incorporated. The MCS will facilitate remote monitoring and control of various machinery, requiring integration with the HM&E-LAN. NAVSEA seeks written responses to specific questions, including the responder's business classification, experiences in naval MCS development, and any design adaptations that could meet specifications. Firms are also required to outline expected timelines for design phases, hardware, and software deliveries, as well as to provide a Rough Order of Magnitude (ROM) cost estimate and possible cost reduction strategies. The deadline for submissions is April 4, 2025. This RFI does not commit the government to any contracts and does not provide reimbursement for submissions.
The document outlines the specifications and requirements for the Machinery Control System (MCS) for the LHA 10. Its main purpose is to establish technical guidelines for the design, construction, and operation of various MCS components, emphasizing remote monitoring and control capabilities for ship machinery. Key elements include definitions of terms related to automated control, control consoles, data acquisition, and fault detection systems. The MCS is required to integrate seamlessly with the Hull, Mechanical and Electrical Local Area Network (HM&E-LAN), supporting functionality across a variety of machinery including propulsion and damage control systems. Notably, the document stresses ensuring fail-safe operations, proactive fault isolation, and compliance with environmental and safety standards. Each MCS unit must have redundancy built into its hardware to maintain operational integrity even in the event of component failures. Additionally, it includes provisions for maintenance, accessibility, and network communication across different functional VLANs for security. Overall, the document serves to guide contractors in meeting federal specifications for naval shipbuilding and modernization, crucial for maintaining operational readiness and safety aboard military vessels.
The document outlines the security requirements for Shipboard Secure Electrical Information Processing Systems (S/SEIPS) pertinent to the LHA 10 project, effective as of April 6, 2023. It defines critical terms such as adjustable parameters and developmental software, and specifies installation compliance with various Information Assurance publications. Key categories of secure spaces, including Special Access Program Facilities (S/SAPFs) and Sensitive Compartmented Information Facilities (S/SCIFs), are detailed to ensure protection of national security information.
The security framework emphasizes cybersecurity management, account authentication, and configuration control. It mandates unique user credentials, stringent password policies, and automated account management protocols. Comprehensive logging and audit measures are established to monitor cybersecurity events and ensure accountability.
Additionally, it requires the protection of data at rest, including encryption standards, and stipulates that all wireless communications be disabled or removed. Physical and logical security protocols govern access to critical systems, while technical documentation requirements ensure transparency and compliance throughout the development lifecycle. Overall, the document emphasizes robust security measures necessary for safeguarding sensitive information and ensuring the integrity of shipboard information systems in compliance with federal directives.
The document outlines specifications for the Hull, Mechanical, and Electrical (HM&E) Local Area Network (LAN) for the LHA 10 vessel. It defines essential terms and connectivity requirements for the HM&E systems, ensuring reliable intra- and inter-system communications. The network will feature a dual backbone, dual-tier distributed topology with fault tolerance measures, permitting uninterrupted communication even during individual component failures.
Installation requirements include the use of industrial-grade or Mil. Spec network switches, with strict adherence to power supply protocols and environmental standards. The Network Management Station (NMS) will provide centralized network oversight, while maintaining logical segmentation of user groups and systems to enhance security and efficiency.
Additionally, the document illustrates network design, cabling specifications, cybersecurity measures, and thorough testing protocols to ensure the system's durability and responsiveness. This comprehensive structure emphasizes the government's commitment to high operational standards in naval environments, while addressing various communication protocols for network management and monitoring.