TCAS II) by Personnel Involved in the Implementation and Operation of TCAS II

Total Page:16

File Type:pdf, Size:1020Kb

TCAS II) by Personnel Involved in the Implementation and Operation of TCAS II Preface This booklet provides the background for a better understanding of the Traffic Alert and Collision Avoidance System (TCAS II) by personnel involved in the implementation and operation of TCAS II. This booklet is an update of the TCAS II Version 7.0 manual published in 2000 by the Federal Aviation Administration (FAA). It describes changes to the CAS logic introduced by Version 7.1 and updates the information on requirements for use of TCAS II and operational experience. Version 7.1 logic changes will improve TCAS Resolution Advisory (RA) sense reversal logic in vertical chase situations. In addition all “Adjust Vertical Speed, Adjust” RAs are converted to “Level-Off, Level-Off” RAs to make it more clear that a reduction in vertical rate is required. The Minimum Operational Performance Standards (MOPS) for TCAS II Version 7.1 were approved in June 2008 and Version 7.1 units are expected to be operating by 2010-2011. Version 6.04a and 7.0 units are also expected to continue operating for the foreseeable future where authorized. 2 Preface................................................................................................................................. 2 The TCAS Solution............................................................................................................. 5 Early Collision Avoidance Systems................................................................................ 5 TCAS II Development .................................................................................................... 6 Initial In-Service Evaluations ......................................................................................... 7 Version 6.0 / 6.04a Implementation................................................................................ 8 Version 7.0 Implementation............................................................................................ 8 Version 7.1 Implementation............................................................................................ 9 Requirements for World-Wide Carriage......................................................................... 9 RVSM Considerations .................................................................................................. 10 Standards and Guidance Material ................................................................................. 10 TCAS II Components ....................................................................................................... 11 TCAS Computer Unit ................................................................................................... 11 Mode S Transponder..................................................................................................... 11 Mode S/TCAS Control Panel........................................................................................ 11 Antennas ....................................................................................................................... 12 Cockpit Presentation ..................................................................................................... 12 Traffic Display.............................................................................................................. 12 Traffic Display Symbology........................................................................................... 13 Resolution Advisory (RA) Display............................................................................... 14 Target Surveillance ........................................................................................................... 17 Mode S Surveillance..................................................................................................... 17 Mode C Surveillance..................................................................................................... 17 Interference Limiting .................................................................................................... 20 Electromagnetic Compatibility ..................................................................................... 20 Hybrid Surveillance ...................................................................................................... 20 Collision Avoidance Concepts.......................................................................................... 22 Sensitivity Level ........................................................................................................... 22 Tau ................................................................................................................................ 23 Protected Volume.......................................................................................................... 26 CAS Logic Functions........................................................................................................ 26 Tracking ........................................................................................................................ 26 Traffic Advisory............................................................................................................ 28 Threat Detection............................................................................................................ 28 Resolution Advisory Selection ..................................................................................... 29 3 TCAS/TCAS Coordination........................................................................................... 34 Air/Ground Communications........................................................................................ 34 Traffic Advisory (TA) Display ..................................................................................... 35 Resolution Advisory (RA) Displays ............................................................................. 35 Aural Annunciations ..................................................................................................... 35 Performance Monitoring............................................................................................... 37 Requirements for Use ....................................................................................................... 37 Regulations and Operational Guidance ........................................................................ 37 Training Programs ........................................................................................................ 41 Operational Experience..................................................................................................... 42 Performance Monitoring Programs............................................................................... 42 Observed Performance.................................................................................................. 43 Summary........................................................................................................................... 46 Abbreviations.................................................................................................................... 47 Glossary ............................................................................................................................ 48 Bibliography ..................................................................................................................... 50 4 aircraft to operate with ATC’s ground-based The TCAS Solution radars. The level of protection provided by TCAS equipment depends on the type of transponder the target aircraft is carrying. After many years of extensive analysis, The level of protection is outlined in development, and flight evaluation by the Table 1. It should be noted that TCAS Federal Aviation Administration (FAA), provides no protection against aircraft other countries’ Civil Aviation Authorities that do not have an operating (CAAs), and the aviation industry, Traffic transponder. Alert and Collision Avoidance System or TCAS was developed to reduce the risk of Table 1. TCAS Levels of Protection mid-air collisions between aircraft. In the international arena, this system is known Own Aircraft Equipment as the Airborne Collision Avoidance TCAS I TCAS II System or ACAS. Mode A TA TA XPDR TCAS is a family of airborne devices that ONLY function independently of the ground-based Mode C TA TA and air traffic control (ATC) system, and or Mode S Vertical RA provide collision avoidance protection for a XPDR broad spectrum of aircraft types. All TCAS systems provide some degree of collision threat alerting, and a traffic display. TCAS I TCAS I TA TA and and II differ primarily by their alerting Vertical RA capability. Target Aircraft Target Equipment TCAS II TA TA and Coordinated TCAS I provides traffic advisories (TAs) to Vertical RA assist the pilot in the visual acquisition of intruder aircraft. TCAS I is mandated for use in the U.S. for turbine powered, Early Collision Avoidance passenger-carrying aircraft having more than Systems 10 and less than 31 seats. TCAS I is also installed on a number of general aviation The 1956 collision between two airliners fixed wing aircraft and helicopters. over the Grand Canyon spurred both the airlines and aviation authorities to initiate TCAS II provides TAs and resolution development of an effective collision advisories (RAs), i.e., recommended escape avoidance system that would act as a last maneuvers, in the vertical dimension to resort when there is a failure in the ATC- either increase or maintain the existing provided separation services. During the vertical separation between
Recommended publications
  • SARS-Cov-2 Vaccine Breakthrough Surveillance and Case Information Resource Washington State Department of Health September 22, 2021
    SARS-CoV-2 Vaccine Breakthrough Surveillance and Case Information Resource Washington State Department of Health September 22, 2021 1 Page Break To request this document in another format, call 1-800-525-0127. Deaf or hard of hearing customers, please call 711 (Washington Relay) or email [email protected]. Publication Number 420-339 For more information or additional copies of this report: Disease Control and Health Statistics Public Health Outbreak Coordination, Information, and Surveillance 1610 NE 150th Street, MS: K17-9 Shoreline, WA 98155 Phone: 206-418-5700 (24-hour contact for local health jurisdictions only) Email: [email protected] 2 Page break SARS-CoV-2 Vaccine Breakthrough Surveillance and Case Information Resource Washington State Department of Health September 22, 2021 COVID-19 vaccines are effective and critical tools to aid in the control of this pandemic. Large- scale clinical studies found that COVID-19 vaccines prevented most people from getting COVID- 19 illness, but like most other vaccines, they are not 100 percent effective. This means some fully vaccinated people will still get infected with SARS-CoV-2. These individuals may or may not develop COVID-19 symptoms. Vaccine breakthrough occurs when someone gets infected with an organism they are fully vaccinated against. For the COVID-19 vaccine, this means someone tests positive for SARS-CoV- 2 two weeks or more after receiving the full series of an authorized COVID-19 vaccine. Since millions of people in the United States are getting vaccinated, we expect to see some breakthrough disease. Fortunately, there is evidence from research studies that the COVID-19 vaccine reduces the risk of people getting really sick and needing to go to the hospital or dying from COVID-19.
    [Show full text]
  • NORWAY LOCAL SINGLE SKY IMPLEMENTATION Level2020 1 - Implementation Overview
    LSSIP 2020 - NORWAY LOCAL SINGLE SKY IMPLEMENTATION Level2020 1 - Implementation Overview Document Title LSSIP Year 2020 for Norway Info Centre Reference 20/12/22/79 Date of Edition 07/04/2021 LSSIP Focal Point Peder BJORNESET - [email protected] Luftfartstilsynet (CAA-Norway) LSSIP Contact Person Luca DELL’ORTO – [email protected] EUROCONTROL/NMD/INF/PAS LSSIP Support Team [email protected] Status Released Intended for EUROCONTROL Stakeholders Available in https://www.eurocontrol.int/service/local-single-sky-implementation- monitoring Reference Documents LSSIP Documents https://www.eurocontrol.int/service/local-single-sky-implementation- monitoring Master Plan Level 3 – Plan https://www.eurocontrol.int/publication/european-atm-master-plan- Edition 2020 implementation-plan-level-3 Master Plan Level 3 – Report https://www.eurocontrol.int/publication/european-atm-master-plan- Year 2020 implementation-report-level-3 European ATM Portal https://www.atmmasterplan.eu/ STATFOR Forecasts https://www.eurocontrol.int/statfor National AIP https://avinor.no/en/ais/aipnorway/ FAB Performance Plan https://www.nefab.eu/docs# LSSIP Year 2020 Norway Released Issue APPROVAL SHEET The following authorities have approved all parts of the LSSIP Year 2020 document and the signatures confirm the correctness of the reported information and reflect the commitment to implement the actions laid down in the European ATM Master Plan Level 3 (Implementation View) – Edition 2020. Stakeholder / Name Position Signature and date Organisation
    [Show full text]
  • Defending Against Insider Use of Digital Steganography
    2007 Annual ADFSL Conference on Digital Forensics, Security and Law Proceedings Defending Against Insider Use of Digital Steganography James E. Wingate CISSP-ISSEP, CISM, IAM, Backbone Security, [email protected] Glenn D. Watt CISSP, CISM, IAM, IEM, Backbone Security, [email protected] Marc Kurtz CISSP, Backbone Security, [email protected] Chad W. Davis CCE, Backbone Security, [email protected] Robert Lipscomb Backbone Security, [email protected] Follow this and additional works at: https://commons.erau.edu/adfsl Part of the Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, and the Information Security Commons Scholarly Commons Citation Wingate, James E.; Watt, Glenn D.; Kurtz, Marc; Davis, Chad W.; and Lipscomb, Robert, "Defending Against Insider Use of Digital Steganography" (2007). Annual ADFSL Conference on Digital Forensics, Security and Law. 1. https://commons.erau.edu/adfsl/2007/session-11/1 This Peer Reviewed Paper is brought to you for free and open access by the Conferences at Scholarly Commons. It has been accepted for inclusion in Annual ADFSL Conference on Digital Forensics, Security and Law by an (c)ADFSL authorized administrator of Scholarly Commons. For more information, please contact [email protected]. Conference on Digital Forensics, Security and Law, 2007 Defending Against Insider Use of Digital Steganography James E. Wingate, CISSP-ISSEP, Glenn D. Watt, CISSP,
    [Show full text]
  • Mass Surveillance
    Thematic factsheet1 Update: July 2018 MASS SURVEILLANCE The highly complex forms of terrorism require States to take effective measures to defend themselves, including mass monitoring of communications. Unlike “targeted” surveillance (covert collection of conversations, telecommunications and metadata by technical means – “bugging”), “strategic” surveillance (or mass surveillance) does not necessarily start with a suspicion against a particular person or persons. It has a proactive element, aimed at identifying a danger rather than investigating a known threat. Herein lay both the value it can have for security operations, and the risks it can pose for individual rights. Nevertheless, Member States do not have unlimited powers in this area. Mass surveillance of citizens is tolerable under the Convention only if it is strictly necessary for safeguarding democratic institutions. Taking into account considerable potential to infringe fundamental rights to privacy and to freedom of expression enshrined by the Convention, Member States must ensure that the development of surveillance methods resulting in mass data collection is accompanied by the simultaneous development of legal safeguards securing respect for citizens’ human rights. According to the case-law of the European Court of Human Rights, it would be counter to governments’ efforts to keep terrorism at bay if the terrorist threat were substituted with a perceived threat of unfettered executive power intruding into citizens’ private lives. It is of the utmost importance that the domestic legislation authorizing far-reaching surveillance techniques and prerogatives provides for adequate and sufficient safeguards in order to minimize the risks for the freedom of expression and the right to privacy which the “indiscriminate capturing of vast amounts of communications” enables.
    [Show full text]
  • The Nsa's Prism Program and the New Eu Privacy Regulation: Why U.S
    American University Business Law Review Volume 3 | Issue 2 Article 5 2013 The SN A'S Prism Program And The ewN EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble Juhi Tariq American University Washington College of Law Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the International Law Commons, and the Internet Law Commons Recommended Citation Tariq, Juhi "The SAN 'S Prism Program And The eN w EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble," American University Business Law Review, Vol. 3, No. 2 (2018) . Available at: http://digitalcommons.wcl.american.edu/aublr/vol3/iss2/5 This Note is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized editor of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NOTE THE NSA'S PRISM PROGRAM AND THE NEW EU PRIVACY REGULATION: WHY U.S. COMPANIES WITH A PRESENCE IN THE EU COULD BE IN TROUBLE JUHI TARIQ* Recent revelations about a clandestine data surveillance program operated by the NSA, Planning Tool for Resource Integration, Synchronization, and Management ("PRISM'), and a stringent proposed European Union ("EU") data protection regulation, will place U.S. companies with a businesspresence in EU member states in a problematic juxtaposition. The EU Proposed General Data Protection Regulation stipulates that a company can be fined up to two percent of its global revenue for misuse of users' data and requires the consent of data subjects prior to access.
    [Show full text]
  • Foreign Intelligence Surveillance: Intelligence Gathering of Prosecution?
    Fordham International Law Journal Volume 6, Issue 3 1982 Article 5 Foreign Intelligence Surveillance: Intelligence Gathering of Prosecution? Christine A. Burke∗ ∗ Copyright c 1982 by the authors. Fordham International Law Journal is produced by The Berke- ley Electronic Press (bepress). http://ir.lawnet.fordham.edu/ilj Foreign Intelligence Surveillance: Intelligence Gathering of Prosecution? Christine A. Burke Abstract This Note considers the permissible uses of information secured through a FISA surveillance in light of the fourth amendment issue raised by Falvey. It concludes that when information is sought for purposes of national security or foreign affairs, the nature of the investigation and the compelling government interest in obtaining the information require fourth amendment standards in some respects different and lower than in ordinary criminal investigations. FOREIGN INTELLIGENCE SURVEILLANCE: INTELLIGENCE GATHERING OR PROSECUTION? INTRODUCTION During 1980, the Federal Bureau of Investigation (FBI) began to investigate an international terrorist organization believed to be operating in New York.' As part of its investigation, the FBI ob- tained a warrant on April 3, 1981 authorizing the electronic surveil- lance2 of two United States citizens, Thomas Falvey and George Harrison, 3 pursuant to the Foreign Intelligence Surveillance Act of 19784 (FISA or Act). 5 The surveillance continued until June 19 or 20 1981;6 Falvey and Harrison were then arrested and charged with smuggling arms and equipment from the United States to the Provisional Irish Republican Army (IRA) in Ireland. 7 The government sought to use tapes of the intercepted tele- phone conversations at trial.8 Pursuant to FISA requirements, the government obtained the Attorney General's approval and in- formed the defendants and the court of its intention to use those tapes.
    [Show full text]
  • Ashley Deeks*
    ARTICLE An International Legal Framework for Surveillance ASHLEY DEEKS* Edward Snowden’s leaks laid bare the scope and breadth of the electronic surveillance that the U.S. National Security Agency and its foreign counterparts conduct. Suddenly, foreign surveillance is understood as personal and pervasive, capturing the communications not only of foreign leaders but also of private citizens. Yet to the chagrin of many state leaders, academics, and foreign citizens, international law has had little to say about foreign surveillance. Until recently, no court, treaty body, or government had suggested that international law, including basic privacy protections in human rights treaties, applied to purely foreign intelligence collection. This is now changing: Several UN bodies, judicial tribunals, U.S. corporations, and individuals subject to foreign surveillance are pressuring states to bring that surveillance under tighter legal control. This Article tackles three key, interrelated puzzles associated with this sudden transformation. First, it explores why international law has had so little to say about how, when, and where governments may spy on other states’ nationals. Second, it draws on international relations theory to argue that the development of new international norms regarding surveillance is both likely and essential. Third, it identifies six process-driven norms that states can and should adopt to ensure meaningful privacy restrictions on international surveillance without unduly harming their legitimate national security interests. These norms, which include limits on the use of collected data, periodic reviews of surveillance authorizations, and active oversight by neutral bodies, will increase the transparency, accountability, and legitimacy of foreign surveillance. This procedural approach challenges the limited emerging scholarship on surveillance, which urges states to apply existing — but vague and contested — substantive human rights norms to complicated, clandestine practices.
    [Show full text]
  • FSF ALAR Briefing Note 3.2 -- Altitude Deviations
    Flight Safety Foundation Approach-and-landing Accident Reduction Tool Kit FSF ALAR Briefing Note 3.2 — Altitude Deviations Altitude deviations may result in substantial loss of aircraft • The pilot-system interface: vertical separation or horizontal separation, which could cause – Altimeter setting, use of autopilot, monitoring of a midair collision. instruments and displays; or, Maneuvers to avoid other aircraft often result in injuries to • The pilot-controller interface: passengers, flight crewmembers and, particularly, to cabin crewmembers. – Communication loop (i.e., the confirmation/ correction process). Statistical Data Altitude deviations occur usually as the result of one or more of the following conditions: An analysis by the U.S. Federal Aviation Administration (FAA) and by USAir (now US Airways) of altitude-deviation events1 • The controller assigns an incorrect altitude or reassigns showed that: a flight level after the pilot was cleared to an altitude; • Approximately 70 percent of altitude deviations were the • Pilot-controller communication breakdown — mainly result of a breakdown in pilot-controller communication; readback/hearback errors such as the following: and, – Controller transmits an incorrect altitude, the pilot • Nearly 40 percent of altitude deviations resulted when does not read back the altitude and the controller does air traffic control (ATC) assigned 10,000 feet and the not challenge the absence of a readback; flight crew set 11,000 feet in the selected-altitude – Pilot reads back an incorrect altitude, but the window, or when ATC assigned 11,000 feet and the flight controller does not hear the erroneous readback and crew set 10,000 feet in the selected-altitude window. does not correct the pilot’s readback; or, Defining Altitude Deviations – Pilot accepts an altitude clearance intended for another aircraft (confusion of call signs); An altitude deviation is a deviation from the assigned altitude • Pilot receives, understands and reads back the correct (or flight level) equal to or greater than 300 feet.
    [Show full text]
  • Multilinear Algebra and Chess Endgames
    Games of No Chance MSRI Publications Volume 29, 1996 Multilinear Algebra and Chess Endgames LEWIS STILLER Abstract. This article has three chief aims: (1) To show the wide utility of multilinear algebraic formalism for high-performance computing. (2) To describe an application of this formalism in the analysis of chess endgames, and results obtained thereby that would have been impossible to compute using earlier techniques, including a win requiring a record 243 moves. (3) To contribute to the study of the history of chess endgames, by focusing on the work of Friedrich Amelung (in particular his apparently lost analysis of certain six-piece endgames) and that of Theodor Molien, one of the founders of modern group representation theory and the first person to have systematically numerically analyzed a pawnless endgame. 1. Introduction Parallel and vector architectures can achieve high peak bandwidth, but it can be difficult for the programmer to design algorithms that exploit this bandwidth efficiently. Application performance can depend heavily on unique architecture features that complicate the design of portable code [Szymanski et al. 1994; Stone 1993]. The work reported here is part of a project to explore the extent to which the techniques of multilinear algebra can be used to simplify the design of high- performance parallel and vector algorithms [Johnson et al. 1991]. The approach is this: Define a set of fixed, structured matrices that encode architectural primitives • of the machine, in the sense that left-multiplication of a vector by this matrix is efficient on the target architecture. Formulate the application problem as a matrix multiplication.
    [Show full text]
  • Flight Dynamics Model Exchange Standard [AIAA10]
    ! BSR/AIAA S-119-201X Proposed ANSI National Standard !"#$%&'()*+,#-.'/012"'34-%+*$2'5&+*1+61' ' ' ' ' Draft 2010-04-23 ' ' ' ' Sponsored by 7,26#-+*'8*.&#&9&2'0:'7260*+9&#-.'+*1'7.&60*+9&#-.' Approved XX Month 201X '' Abstract ;%#.'#.'+'.&+*1+61':06'&%2'#*&26-%+*$2'0:'.#,9"+&#0*',012"#*$'1+&+'<2&=22*':+-#"#&#2.>';%2'#*#&#+"'0<?2-&#@2' #.'&0'+""0='2+.)A'.&6+#$%&:06=+61'24-%+*$2.'0:'.#,9"+&#0*',012"'#*:06,+&#0*'+*1'1+&+'<2&=22*':+-#"#&#2.>'' ;%2'.&+*1+61'+BB"#2.'&0'@#6&9+"")'+*)'@2%#-"2',012"'C$609*1A'+#6'06'.B+-2DA'<9&',0.&'1#62-&")'+BB"#2.'&0' +#6-6+:&'+*1',#..#"2.> ! " ! ' ' ' ' ' ' ' ' ' LIBRARY OF CONGRESS CATALOGING DATA WILL BE ADDED HERE BY AIAA STAFF E9<"#.%21'<)' American Institute of Aeronautics and Astronautics 1801 Alexander Bell Drive, Reston, VA 20191 F0B)6#$%&'G'HIJK'7,26#-+*'8*.&#&9&2'0:'7260*+9&#-.'+*1' 7.&60*+9&#-.' 7""'6#$%&.'62.26@21' ' L0'B+6&'0:'&%#.'B9<"#-+&#0*',+)'<2'62B6019-21'#*'+*)':06,A'#*'+*'2"2-&60*#-'62&6#2@+"'.).&2,' 06'0&%26=#.2A'=#&%09&'B6#06'=6#&&2*'B26,#..#0*'0:'&%2'B9<"#.%26>' ' E6#*&21'#*'&%2'M*#&21'5&+&2.'0:'7,26#-+' ""! ! ! Contents F0*&2*&.>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> ###' !062=061>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> #@' 8*&6019-&#0* >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
    [Show full text]
  • CHECKMATE PHARMACEUTICALS, INC. (Exact Name of Registrant As Specified in Its Charter)
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 8-K CURRENT REPORT Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 Date of Report (Date of earliest event reported): May 13, 2021 CHECKMATE PHARMACEUTICALS, INC. (Exact name of registrant as specified in its charter) Delaware 001-39425 36-4813934 (State or other jurisdiction (Commission (I.R.S. Employer of incorporation) File Number) Identification No.) Checkmate Pharmaceuticals, Inc. 245 Main Street, 2nd Floor Cambridge, MA 02142 (Address of principal executive offices, including zip code) (617) 682-3625 (Registrant’s telephone number, including area code) Not Applicable (Former Name or Former Address, if Changed Since Last Report) Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligation of the registrant under any of the following provisions: ☐ Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425) ☐ Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12) ☐ Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b)) ☐ Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (17 CFR 240.13e-4(c)) Securities registered pursuant to Section 12(b) of the Act: Trade Name of each exchange Title of each class Symbol(s) on which registered Common Stock, $0.0001 par value per share CMPI The Nasdaq Global Market Indicate by check mark whether the registrant is an emerging growth company as defined in Rule 405 of the Securities Act of 1933 (§ 230.405 of this chapter) or Rule 12b-2 of the Securities Exchange Act of 1934 (§ 240.12b-2 of this chapter).
    [Show full text]
  • Chapter: 2. En Route Operations
    Chapter 2 En Route Operations Introduction The en route phase of flight is defined as that segment of flight from the termination point of a departure procedure to the origination point of an arrival procedure. The procedures employed in the en route phase of flight are governed by a set of specific flight standards established by 14 CFR [Figure 2-1], FAA Order 8260.3, and related publications. These standards establish courses to be flown, obstacle clearance criteria, minimum altitudes, navigation performance, and communications requirements. 2-1 fly along the centerline when on a Federal airway or, on routes other than Federal airways, along the direct course between NAVAIDs or fixes defining the route. The regulation allows maneuvering to pass well clear of other air traffic or, if in visual meteorogical conditions (VMC), to clear the flightpath both before and during climb or descent. Airways Airway routing occurs along pre-defined pathways called airways. [Figure 2-2] Airways can be thought of as three- dimensional highways for aircraft. In most land areas of the world, aircraft are required to fly airways between the departure and destination airports. The rules governing airway routing, Standard Instrument Departures (SID) and Standard Terminal Arrival (STAR), are published flight procedures that cover altitude, airspeed, and requirements for entering and leaving the airway. Most airways are eight nautical miles (14 kilometers) wide, and the airway Figure 2-1. Code of Federal Regulations, Title 14 Aeronautics and Space. flight levels keep aircraft separated by at least 500 vertical En Route Navigation feet from aircraft on the flight level above and below when operating under VFR.
    [Show full text]