{"id":404,"date":"2020-05-18T21:56:14","date_gmt":"2020-05-18T19:56:14","guid":{"rendered":"https:\/\/www.spacesecurity.info\/?p=404"},"modified":"2020-05-18T21:56:14","modified_gmt":"2020-05-18T19:56:14","slug":"description-of-the-elements-of-a-satellite-command-and-control-system","status":"publish","type":"post","link":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/","title":{"rendered":"Description of the Elements of a Satellite Command and Control System"},"content":{"rendered":"<p>In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely all the elements that make up the system and the links between them.<\/p>\n<p>Figure 1 shows a simplified example of the network topology of a satellite Command and Control system. It is composed of an operations centre, a base station (or ground station), a ground network and a satellite.<\/p>\n<figure id=\"attachment_71\" aria-describedby=\"caption-attachment-71\" style=\"width: 855px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-A2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-71 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-A2.jpg\" alt=\"\" width=\"855\" height=\"716\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-A2.jpg 855w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-A2-300x251.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-A2-768x643.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-A2-696x583.jpg 696w\" sizes=\"auto, (max-width: 855px) 100vw, 855px\" \/><\/a><figcaption id=\"caption-attachment-71\" class=\"wp-caption-text\">Figure 1: Example of the network topology of a satellite Command and Control system<\/figcaption><\/figure>\n<p>The base station is the central element of the device. It is through it that the operations centre can communicate with the satellite.<\/p>\n<p>The link between the satellite and the base station carries three different types of information: payload (payload), telemetry (TT&amp;C) and Command &amp; Control (C2).<\/p>\n<figure id=\"attachment_56\" aria-describedby=\"caption-attachment-56\" style=\"width: 1023px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/1024px-Estaci\u00f3n_DS3_Malargue1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-56 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/1024px-Estaci\u00f3n_DS3_Malargue1.jpg\" alt=\"\" width=\"1023\" height=\"681\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/1024px-Estaci\u00f3n_DS3_Malargue1.jpg 1023w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/1024px-Estaci\u00f3n_DS3_Malargue1-300x200.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/1024px-Estaci\u00f3n_DS3_Malargue1-768x511.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/1024px-Estaci\u00f3n_DS3_Malargue1-696x463.jpg 696w\" sizes=\"auto, (max-width: 1023px) 100vw, 1023px\" \/><\/a><figcaption id=\"caption-attachment-56\" class=\"wp-caption-text\">Malargue station in Argentina, used by the European Space Agency (Cr\u00e9dits : CONAE &#8211; <a class=\"mw-mmv-license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/2.5\/ar\/deed.en\" target=\"_blank\" rel=\"noopener noreferrer\">CC BY 2.5 ar<\/a>)<\/figcaption><\/figure>\n<p><strong>The payload<\/strong> corresponds to the data transported or collected by the satellite and used by the satellite&#8217;s customers (images, TV, internet, weather, etc &#8230;).<\/p>\n<p><strong>Telemetry<\/strong> corresponds to data sent by the satellite, for example on its position or status. Telemetry is composed of three elements called TT&amp;C for Telemetry, Tracking &amp; Control.<\/p>\n<p>Finally, <strong>Command &amp; Control (C2)<\/strong> are instructions sent to the satellite by the operations centre to perform, for example, orbit correction manoeuvres.<\/p>\n<figure id=\"attachment_65\" aria-describedby=\"caption-attachment-65\" style=\"width: 696px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/KA-sat1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-65 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/KA-sat1-1024x730.jpg\" alt=\"\" width=\"696\" height=\"496\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/KA-sat1-1024x730.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/KA-sat1-300x214.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/KA-sat1-768x548.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/KA-sat1-696x496.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/KA-sat1-1068x762.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/KA-sat1-100x70.jpg 100w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/KA-sat1.jpg 1200w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-65\" class=\"wp-caption-text\">KA-SAT geostationary telecommunications satellite built in 2011 by Astrium for the European company Eutelsat. Credits : Wikipedia<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>A ground station operates 7 days a week, 24 hours a day. It is remotely controlled and operated by the operations centre via IP or serial interfaces. It is capable of communicating with several satellites, requiring repositioning each time.<\/p>\n<p><strong>Space Data Link<\/strong> (SDL) is a protocol used to transport the satellite payload as well as telemetry and Command &amp; Control.<\/p>\n<p>The terrestrial network that connects the base station to the operations centre consists of a link called the <strong>Space Link Extension<\/strong> (SLE) Services. The Space Link Extension (SLE) extends the Space Data Link (SDL) from the satellite to the operations centre.<\/p>\n<p>The security of these two protocols will be discussed in a future article.<\/p>\n<figure id=\"attachment_66\" aria-describedby=\"caption-attachment-66\" style=\"width: 696px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Main_Control_Room_at_ESA_s_Space_Operations_Centre.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-66 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Main_Control_Room_at_ESA_s_Space_Operations_Centre-1024x683.jpg\" alt=\"\" width=\"696\" height=\"464\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Main_Control_Room_at_ESA_s_Space_Operations_Centre-1024x683.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Main_Control_Room_at_ESA_s_Space_Operations_Centre-300x200.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Main_Control_Room_at_ESA_s_Space_Operations_Centre-768x512.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Main_Control_Room_at_ESA_s_Space_Operations_Centre-696x464.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Main_Control_Room_at_ESA_s_Space_Operations_Centre-1068x713.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Main_Control_Room_at_ESA_s_Space_Operations_Centre.jpg 1151w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-66\" class=\"wp-caption-text\">Control room of ESOC, the European Space Operations Centre, located in Darmstadt, Germany, in charge of monitoring all the space probes that are under the full control of the European Space Agency (ESA) &#8211; Cr\u00e9dits : ESA\/J.Mai &#8211; CC BY-SA 3.0 IGO<\/figcaption><\/figure>\n<p>In the previous network topology, the satellite payload, telemetry (TT&amp;C) and Command &amp; Control (C2) are multiplexed on the same satellite link. In most missions, this link is actually separated into two separate links as shown in Figure 2 with one link to carry the payload and another link to carry the telemetry (TT&amp;C) and Command &amp; Control (C2). On each of the two links is the Space Data Link (SDL) which is extended from the satellite to the operations centre by the Space Link Extension (SLE).<\/p>\n<figure id=\"attachment_77\" aria-describedby=\"caption-attachment-77\" style=\"width: 696px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-77 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-1024x663.jpg\" alt=\"\" width=\"696\" height=\"451\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-1024x663.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-300x194.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-768x497.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-696x450.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-1068x691.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2.jpg 1131w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-77\" class=\"wp-caption-text\">Figure 2: Example of the network topology of a satellite Command and Control system with payload and telemetry link separation<\/figcaption><\/figure>\n<p>To be even more precise, we have added in the following diagram (Figure 3), a user of the service offered by the satellite. This can be either a passive terminal that only receives a signal (example: a TV decoder) or an active terminal that receives and sends a signal (example: a satellite telephone).<\/p>\n<figure id=\"attachment_72\" aria-describedby=\"caption-attachment-72\" style=\"width: 696px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-with-customer.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-72 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-with-customer-1024x541.jpg\" alt=\"\" width=\"696\" height=\"368\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-with-customer-1024x541.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-with-customer-300x158.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-with-customer-768x406.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-with-customer-696x368.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-with-customer-1068x564.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2-with-customer.jpg 1386w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-72\" class=\"wp-caption-text\">Figure 3: Network topology of a satellite Command and Control system payload, telemetry and customer links<\/figcaption><\/figure>\n<p>Finally, the last diagram (Figure 4) allows us to identify 3 different sets called segments that make up most spacecraft Command and Control systems.<\/p>\n<p>The <strong>Ground Segment<\/strong> is composed of all the elements on the ground that are used for telemetry, Command and Control and payload distribution. The Ground Segment consists of the base stations, the operations centre and the ground network. The ground segment also includes all test, integration and launch systems when the mission also includes a launcher.<\/p>\n<p>The <strong>Space Segment<\/strong> is composed of the satellite (or constellation of satellites), the uplink and downlink. In some models, the satellite links may be part of a separate segment called the <strong>Space-Link Communications Segment<\/strong>.<\/p>\n<p>The <strong>User Segment<\/strong> consists of all user equipment that receives the signal from the satellite but can also transmit a signal to the satellite.<\/p>\n<figure id=\"attachment_74\" aria-describedby=\"caption-attachment-74\" style=\"width: 696px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Segments-List.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-74 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Segments-List-1024x633.jpg\" alt=\"\" width=\"696\" height=\"430\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Segments-List-1024x633.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Segments-List-300x185.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Segments-List-768x474.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Segments-List-696x430.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Segments-List-1068x660.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Segments-List.jpg 1431w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-74\" class=\"wp-caption-text\">Figure 4: Simplified diagram representing the 3 segments of a satellite Command and Control system<\/figcaption><\/figure>\n<p>These three segments together will represent the scope of our risk analysis of a space system, which will be the subject of a future article.<\/p>\n<p>For this article, we have studied the presentation by Ignacio Aguilar Sanchez (ESA) and Daniel Fischer (ESA) available <a href=\"https:\/\/hyperelliptic.org\/DIAC\/slides\/ESA-Contribution-to-DIAC-2012.pdf\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely all the elements that make up the system and the links between them. Figure 1 shows a simplified example of the network topology of a satellite Command and Control system. It [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":412,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,28],"tags":[],"class_list":{"0":"post-404","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking-en","8":"category-satellite-en"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Description of the Elements of a Satellite Command and Control System - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Description of the Elements of a Satellite Command and Control System - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely all the elements that make up the system and the links between them. Figure 1 shows a simplified example of the network topology of a satellite Command and Control system. It [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-18T19:56:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1131\" \/>\n\t<meta property=\"og:image:height\" content=\"732\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fran\u00e7ois Quiquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fran\u00e7ois Quiquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/\"},\"author\":{\"name\":\"Fran\u00e7ois Quiquet\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\"},\"headline\":\"Description of the Elements of a Satellite Command and Control System\",\"datePublished\":\"2020-05-18T19:56:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/\"},\"wordCount\":827,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Mission-Network-Topology-B2.jpg\",\"articleSection\":[\"Hacking\",\"Satellite\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/\",\"name\":\"Description of the Elements of a Satellite Command and Control System - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Mission-Network-Topology-B2.jpg\",\"datePublished\":\"2020-05-18T19:56:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Mission-Network-Topology-B2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Mission-Network-Topology-B2.jpg\",\"width\":1131,\"height\":732},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/description-of-the-elements-of-a-satellite-command-and-control-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Description of the Elements of a Satellite Command and Control System\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\",\"name\":\"Fran\u00e7ois Quiquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"caption\":\"Fran\u00e7ois Quiquet\"},\"description\":\"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\\\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/www.spacesecurity.info\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/francoisquiquet\\\/\"],\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/author\\\/francois\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Description of the Elements of a Satellite Command and Control System - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/","og_locale":"en_US","og_type":"article","og_title":"Description of the Elements of a Satellite Command and Control System - Space &amp; Cybersecurity Info","og_description":"In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely all the elements that make up the system and the links between them. Figure 1 shows a simplified example of the network topology of a satellite Command and Control system. It [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/","og_site_name":"Space &amp; Cybersecurity Info","article_published_time":"2020-05-18T19:56:14+00:00","og_image":[{"width":1131,"height":732,"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2.jpg","type":"image\/jpeg"}],"author":"Fran\u00e7ois Quiquet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fran\u00e7ois Quiquet","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/#article","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/"},"author":{"name":"Fran\u00e7ois Quiquet","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c"},"headline":"Description of the Elements of a Satellite Command and Control System","datePublished":"2020-05-18T19:56:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/"},"wordCount":827,"commentCount":1,"publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2.jpg","articleSection":["Hacking","Satellite"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/","url":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/","name":"Description of the Elements of a Satellite Command and Control System - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2.jpg","datePublished":"2020-05-18T19:56:14+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/Mission-Network-Topology-B2.jpg","width":1131,"height":732},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/description-of-the-elements-of-a-satellite-command-and-control-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"Description of the Elements of a Satellite Command and Control System"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c","name":"Fran\u00e7ois Quiquet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","caption":"Fran\u00e7ois Quiquet"},"description":"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.","sameAs":["https:\/\/www.spacesecurity.info","https:\/\/www.linkedin.com\/in\/francoisquiquet\/"],"url":"https:\/\/www.spacesecurity.info\/en\/author\/francois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=404"}],"version-history":[{"count":2,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/404\/revisions"}],"predecessor-version":[{"id":413,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/404\/revisions\/413"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/412"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/categories?post=404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/tags?post=404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}