Ac20 145
Ac20 145
Date: 2/25/03
2/25/03 AC 20-145
TABLE OF CONTENTS
1. PURPOSE......................................................................................................................1
3. DEFINITIONS. .............................................................................................................3
4. ACRONYMS. ................................................................................................................5
5. SCOPE. ..........................................................................................................................6
6. BACKGROUND. ..........................................................................................................7
Page i
AC 20-145 2/25/03
Page ii
Date: 2/25/03 AC No: 20-145
Subject: GUIDANCE FOR
INTEGRATED MODULAR
AVIONICS (IMA) THAT Initiated By: AIR-100 Change:
IMPLEMENT TSO-C153
AUTHORIZED HARDWARE
ELEMENTS
1. PURPOSE.
a. This advisory circular (AC) establishes an acceptable means, but not the only means, to
obtain Federal Aviation Administration’s (FAA) airworthiness approval for the installation of an
Integrated Modular Avionics (IMA) System that uses hardware elements authorized under
Technical Standard Order (TSO)-C153, Integrated Modular Avionics Hardware Elements. The
FAA’s TSO process is a means for obtaining FAA design and production approval for an
appliance, system, or product; however, the TSO authorization does not provide installation
approval. This AC provides guidance for applicants involved in the integration, installation,
certification, and continued airworthiness of IMA systems into an aircraft or engine, when the
IMA system utilizes hardware elements that comply with TSO-C153. The guidance applies to
the entire IMA system, not just the hardware elements. The guidance is specific to installations
of these systems on aircraft or engines approved under Title 14 of the Code of Federal
Regulations (14 CFR) parts 23, 25, 27, 29, 33, and 35.
b. The means of compliance presented in this AC is not mandatory; therefore, the term
“must” used in this AC only applies to an applicant who follows this particular means of
compliance and TSO-C153.
2. RELATED DOCUMENTS. The latest amendments of the following publications are the
primary reference tools when using this AC:
a. Code of Federal Regulations. Title 14 CFR parts 21, 23, 25, 27, 29, 33, 35, 91, 121,
and 135.
b. FAA Technical Standard Order (TSO). Copies of TSOs may be obtained from the
Department of Transportation, FAA, Aircraft Certification Service, Aircraft Engineering
Page 1
AC 20-145 2/25/03
Division, AIR-100, 800 Independence Avenue, SW, Washington, D.C. 20591, or from the FAA
website at http://av-info.faa.gov/tso. The following TSO is relevant to this AC:
c. FAA Policy Documents. The following policy documents are relevant to this AC:
d. FAA Advisory Circulars (AC). Copies of ACs may be obtained from the Department
of Transportation, Subsequent Distribution Office, SVC-121.23, Ardmore East Business Center,
3341 Q 75th Ave, Landover, MD 20785. The following ACs are relevant to this AC:
(2) AC 20-115, Radio Technical Commission for Aeronautics, Inc. (RTCA) Document
RTCA/DO-178B;
Page 2
2/25/03 AC 20-145
(11) AC 33.28-1, Compliance Criteria for 14 CFR § 33.28, Aircraft Engines, Electrical
and Electronic Engine Control Systems; and
e. RTCA, Inc. Documents. Copies of RTCA documents may be purchased from RTCA,
Inc., 1828 L Street, NW, Suite 805, Washington, D.C. 20036. Alternatively, copies may be
purchased on-line at http://www.rtca.org. RTCA documents referenced in this AC are:
(2) ARP4761, Guidelines and Methods for Conducting the Safety Assessment Process
on Civil Airborne Systems and Equipment.
3. DEFINITIONS.
a. Cognizant Aircraft Certification Office (ACO). The ACO granting the certificate or
TSO authorization for the specific product, system, or appliance.
Page 3
AC 20-145 2/25/03
b. Design Assurance. All planned and systematic actions and data that substantiate that
hardware or software correctly performs its intended function(s) and that design errors have been
identified and corrected such that the hardware or software satisfies the applicable certification
basis.
c. Development Assurance. All planned and systematic actions used to substantiate that
development errors have been identified and corrected such that the system satisfies the
applicable certification basis.
g. Hardware Element. A hardware element (as defined in TSO-C153) is: (1) a hardware
module, or (2) cabinets or racks that host hardware modules. TSO-C153 authorization of a
hardware element is not considered a functional TSO authorization.
h. IMA System. For this AC, an IMA system encompasses all components (such as,
hardware elements, software, displays, control devices, sensors, receivers, and transmitters)
needed to make the aircraft or engine system functional and operational.
i. Partitioning. The process of separating, usually with the express purpose of isolating
one or more attributes of a function, to prevent specific interactions and cross-coupling
interference. The terms “partitioning” and “protection” are often used interchangeably; however,
partitioning is typically considered a means of protection.
j. Protection. A concept that ensures the separation of avionics functions so that a fault in
one function cannot affect another. Protection is typically considered a superset of partitioning;
however, the two terms are often used interchangeably.
k. Red Label Unit. For this AC, a red label unit is one that contains hardware and/or
software that does not yet have FAA approval.
l. Software Component. A functional software file that is loaded into the IMA system.
Page 4
2/25/03 AC 20-145
n. System Configuration File. A data file loaded into the IMA system. It typically
defines the IMA system, rack, or cabinet configuration; provides means of checking that the
system is correctly configured and that the correct software has been successfully loaded;
provides parameters for checking that system and hardware module resource management
protection features are functioning properly; and performs other related functions.
Page 5
AC 20-145 2/25/03
5. SCOPE.
a. IMA systems using TSO-C153 require consideration by all stakeholders involved (for
example, the hardware element manufacturer, the functional TSO applicant, the IMA system
integrator, the type certification applicant, and the FAA). This AC provides guidance for
applicants involved in the integration, installation, certification, and continued airworthiness of
IMA systems that use TSO-C153 authorized hardware elements in aircraft or engines. The
guidance of this AC is focused on applicants who implement or interface with TSO-C153
authorized hardware elements. It should be noted that TSO-C153 authorization does not provide
functional approval nor installation approval. This AC applies to the installation, integration,
certification, and continued airworthiness of the entire IMA system, including the hardware
elements. This AC provides guidance for an IMA system installed on an aircraft to provide
aircraft or engine system functions. It addresses the integration of hardware elements, software,
displays, sensors, control devices, and any other components needed to ensure the aircraft or
engine systems operate properly and safely.
c. While this AC is focused on IMA systems that use TSO-C153 authorized hardware
elements, much of the guidance may also be useful for IMA systems that do not use these
hardware elements.
Page 6
2/25/03 AC 20-145
6. BACKGROUND.
a. IMA systems, depending on the specific aircraft or engine application, can combine
many functions that have historically been contained in functionally and physically separated
systems. The integration of many functions and the implementation of hardware elements
present several obstacles for compliance to the regulations. This AC provides a means of
compliance to the regulations for applicants involved in the integration, installation, certification,
and continued airworthiness of IMA systems for an aircraft or engine.
b. TSO-C153 identifies two types of hardware that are considered hardware elements:
(1) hardware modules and (2) cabinets/racks that host hardware modules. The hardware
elements that do not have TSO-C153 authorization can also be integrated into IMA systems, if
they meet the environmental, interoperability, and regulatory requirements of the installation
(that is, they are approved as part of the TC/STC/ATC/ASTC).
Page 7
AC 20-145 2/25/03
several levels of design and approval. Three types of authorization or approval will typically be
applicable:
(1) A functional TSO authorization is for a TSO with a defined functionality (for
example, air data computer, TSO-106). Other examples of functional TSOs are listed in
appendix 1 of this AC. TSO-C153 is not considered a functional TSO, because these hardware
elements do not have system-level functionality. The TSO-C153 and functional TSO applicants
may be different entities. The functional TSO applicant must demonstrate that the IMA system,
when loaded with the functional software, meets all applicable requirements of the functional
TSO. Additionally, all environmental qualification testing must be carried out for the functional
TSO. The environmental qualification may include selected environmental qualification tests
performed as part of the TSO-C153.
(2) The configuration of all software components and hardware modules installed in
TSO-C153 authorized cabinets or racks must be identified in the type design defined for the
particular aircraft or engine model. Additionally, the software and hardware must conform to
that type design.
(4) A functional TSO authorization (for example, a Global Positioning System (GPS)
hardware module that includes the functional software) may be obtained on a hardware element
to be installed in a TSO-C153 authorized rack or cabinet. In this case, a hardware element
without TSO-C153 authorization must be identified with the functional TSO markings.
(5) TSO authorization is not an authorization to install either the TSO-C153 hardware
element or a functional TSO authorized system in an aircraft.
(6) Some functional TSO applications may be aircraft-specific (that is, they only apply
to one aircraft type). These aircraft-specific TSO applications must meet the minimum
performance standards (MPS) of the applicable TSO(s).
(7) Order 8150.1 (see the most current edition) provides additional information on TSO
procedures.
Page 8
2/25/03 AC 20-145
c. Installation Approval.
(1) The TC/STC/ATC/ASTC applicant must demonstrate that the installed IMA system
configuration (including hardware and software) meets the appropriate aircraft and engine
certification basis. This demonstration must include functional performance, interoperability,
aircraft-level and system-level safety assessments, environmental qualification, system
integration test, flight test, software assurance, hardware assurance, and other certification
activities (as required to show compliance to the regulations).
a. Because of the high level of complexity and integration inherent in IMA systems, it is
recommended that applicants conduct a structured formal analysis of these systems using the
guidance contained in Society of Automotive Engineers (SAE) ARP4754 (Certification
Considerations for Highly-Integrated or Complex Aircraft Systems) and ARP4761 (Guidelines
and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and
Equipment), or an acceptable alternative. IMA systems, depending on the specific airframe
application, can combine many functions that historically have been contained in functionally
and physically separate systems. In the IMA system architecture, electrical power, computing
hardware, memory, databus, physical location, etc. may all be shared by multiple functions; some
of which have little commonality with each other.
b. All hosted functions may use common resources, such as common processing, common
operating system, common protection and partitioning mechanisms, common core services, and
common interconnect buses. System and functional hardware module communications may be
tied together using a bi-directional digital communication network that uses a standard interface
circuit for each hardware module. Time and space software partitioning may rely on a common
operating system that allows functions of mixed hazard categories, design assurance levels, and
software levels to co-exist and execute on the same processing platform. These features raise
several concerns, such as:
Page 9
AC 20-145 2/25/03
(1) Possible interference to critical systems (for example, fly-by-wire flight controls or
electronic engine control) by functions of lower integrity.
(2) Failure conditions (either single or multiple) that could affect multiple functions,
thereby reducing safety and causing increased flight crew workloads when attempting to
determine the nature of the problem and the correct flight crew response.
(1) Functional Hazard Assessment (FHA). The intended functions of the IMA
system should be identified and evaluated for their impact on aircraft and engine safety. An FHA
should be conducted at the aircraft level to determine and classify the hazards associated with
both the loss and malfunction of each function provided by the IMA system. The hazards
associated with the simultaneous loss or malfunction of multiple functions provided by the IMA
system must also be identified and classified. In addition, the loss and malfunction of functions
provided by the IMA system should be considered in combination with the loss and malfunction
of related functions provided by other aircraft and engine systems.
(a) Based on the hazard classifications determined by the FHA, the proposed
design and installation of the IMA system should be evaluated by a PSSA to establish the
specific safety requirements of each component in the IMA system (for example, cabinet, rack,
hardware modules, buses, connectors, displays, sensors, control devices, and functional
software).
(b) The PSSA should establish the number, isolation features, and reliability of
each component of the IMA system, including the power supplies, communication interfaces,
displays, and controls that are required to protect the aircraft from the effects of random hardware
failures. The system development assurance levels necessary to protect the aircraft and engine
from design and development errors in the hardware and software of each hardware element
should be determined. Unless extraordinary measures are provided (for example, physical and
electrical isolation within a cabinet or rack) to protect an IMA cabinet or rack from common-
cause failures (such as an electrical fire), all of the functions provided by a single IMA cabinet or
rack should be assumed to fail as the result of a single failure. All functions that use any single
hardware element (for example, printed wire board, connector, power supply, or wire bundle)
should be assumed to fail as the result of a single failure. Loss of all functions in each IMA
Page 10
2/25/03 AC 20-145
cabinet or rack and/or hardware module should be addressed in the safety analysis, including
common-cause issues.
(c) The PSSA should consider the fail-safe design techniques, as applicable for the
aircraft type (for example, AC 25.1309-1 for Part 25 aircraft). The PSSA should ensure the
effective use of design techniques in order to prevent single failures or other events from
damaging or adversely affecting: (1) more than one IMA cabinet or rack, and/or (2) an IMA
cabinet or rack and independent aircraft and engine systems performing operationally similar
functions. To simplify the analysis, the IMA system should be installed to minimize the effects
of its failures on other aircraft and engine systems. When considering such common-cause
failures or other events, consequential or cascading effects should also be addressed. Some
examples of such potential common-cause failures or other events include:
2. Pressure differentials.
6. Contamination by fluids.
9. Excessive voltage.
11. Errors (for example, design errors, operation errors, and maintenance
errors).
Page 11
AC 20-145 2/25/03
22. Lightning.
(d) See SAE ARP4761 for more information on recommended methods for
conducting a Zonal Safety Analysis and a Particular Risks Assessment.
(e) The software level should be determined for all installed software. The
software level may be determined using the procedures described in RTCA/DO-178B.
Additional guidance material for assigning software levels by aircraft category should be
consulted (for example, AC 23.1309-1C for Part 23 airplanes). When the applicant uses system
architectural features, as described in SAE ARP4754, to propose a lower software level than the
level determined by the guidance contained in RTCA/DO-178B, the applicant should consult
with certification authorities early in the program and obtain concurrence.
(f) If the IMA system contains electronic devices that cannot feasibly be evaluated
by test and/or analysis, hardware design assurance levels should be identified using a functional
failure path analysis, as described in Appendix B of RTCA/DO-254, Design Assurance Guidance
for Airborne Electronic Hardware. The appropriate design assurance should be achieved for
each complex electronic device using RTCA/DO-254 or other acceptable means of compliance.
Page 12
2/25/03 AC 20-145
(g) Confirmation that any hazards associated with failure of the functions
implemented in the IMA system, combined with the failure of other aircraft systems, have been
addressed.
(h) Laboratory, simulator, and aircraft test (ground and flight) data, as appropriate,
that substantiate flight crew recognition and response to failure conditions.
(i) An assurance that any failure modes of lower criticality functions that could
adversely affect higher criticality functions are addressed.
(j) Confirmation that all software has been developed to the appropriate software
level identified in the PSSA using the guidance of RTCA/DO-178B or other acceptable means of
compliance.
Page 13
AC 20-145 2/25/03
(2) Producing and distributing hardware elements without loading specific functional
software.
(3) Allowing electronic part numbering for software components, without the need to
physically mark hardware elements with the software part number(s).
(7) Providing the ability to update and maintain IMA system configuration files without
corruption.
c. IMA systems that do not include field-loadable software may not need a robust
automated configuration management scheme when other means (such as, mechanical interlocks
or keyed connectors) are implemented.
d. When field-loadable software is loaded into the IMA system, a robust automated
configuration management scheme is required to enable the safe operation and maintenance of an
IMA system with some or all of the features described in 10a above. This scheme, along with
any necessary manual inspections, must guarantee that the configuration of the software
components loaded is identical to what was approved under the TC, STC, ATC, or ASTC
process. The scheme must also be able to identify improper configuration of the hardware
elements and software components in the IMA system. Improper configuration of the hardware
elements and software components in the IMA system must be annunciated to the flight crew
until appropriate maintenance action has been taken. In addition, the automated configuration
management scheme should provide a means to verify that the software components and
hardware elements of the system are correctly configured for the aircraft on which they are
Page 14
2/25/03 AC 20-145
installed (for example, the automated configuration management system should ensure that the
correct software is loaded into the correct hardware element(s) and is installed in the correct rack
or cabinet location).
f. If individual hardware elements require direct interfaces to the aircraft, engine, or other
equipment with mechanical connector(s), the applicant must show that each interface, by either
mechanical means or automated electronic monitoring, will prevent or detect an incorrect
connection at power up.
h. All changes to an IMA system, whether the change is major or minor (by either the TSO
definition (14 CFR § 21.611) or the TC definition (14 CFR § 21.93)), should be evaluated and
tracked by the TC/STC/ATC/ASTC holder. The results of the change evaluation should be
included in the type design data package for the change. Additional guidance on the change
process is included in section 20c of this AC. The following configuration management items
should be considered when making changes:
(1) All software changes in the hardware elements, whether major or minor, should be
tracked by the automated configuration management system.
(2) Hardware changes to hardware elements that do not affect weight, balance,
structural strength, reliability, operational characteristics, or other characteristics affecting
airworthiness of the aircraft (for example, change of resistor manufacturer) may be approved as a
minor change to the TSO-C153 authorization. The change should at least result in a modification
status update to the hardware element and should be tracked by the TC/STC/ATC/ASTC
applicant.
(3) All major hardware changes to hardware elements should be tracked by the
automated configuration management system. However, minor hardware changes to hardware
elements need not be tracked by the automated configuration management system.
Page 15
AC 20-145 2/25/03
b. Electronic software part numbers and versions must be verifiable through an electronic
query, such as an electronic display. Software part number configuration errors must be
annunciated to the flight crew until appropriate maintenance action has been taken.
c. 14 CFR § 21.607 requires TSO’d equipment to be permanently and legibly marked with
specific information. Compliance to 14 CFR § 21.607 can be demonstrated when the
information required to be included is provided by an electronic identification query system
stored in non-volatile memory. This approach is commonly referred to as an “electronic TSO
nameplate.” The electronic identification system must be verifiable on-board the aircraft, when
the aircraft is on the ground at any geographic location, and must provide the specific
information required by 14 CFR § 21.607 for all applicable functional TSOs being integrated.
d. Electronic identification may also provide software component and hardware element
revision or modification status information and RTCA/DO-178B software level which can be
used to demonstrate conformity to type design configuration.
e. Information identifying the location of each hardware element must be included in the
electronic identification since configuration is dependent on the specific location of each
hardware element within the cabinet or rack. This requirement can be satisfied when the
automated configuration management scheme tracks and protects the IMA system configuration
by ensuring hardware elements are properly located.
f. All hardware elements that support a functional TSO must have a physical TSO
nameplate (either a TSO-C153 or a functional TSO nameplate). Even when electronic
identification (that is, electronic nameplate) is used, a physical TSO nameplate (either functional
TSO or TSO-C153) must be included on supporting hardware elements.
h. Operators should establish a separate process that records the IMA system configuration
(for example, identification and revision status of hardware elements and software components).
This information should be kept up-to-date and maintained off-board the aircraft.
Page 16
2/25/03 AC 20-145
TC/STC/ATC/ASTC applicants should define the process as part of their instructions for
continued airworthiness (per 14 CFR § XX.1529, where XX may be 14 CFR parts 23, 25, 27, or
29). Operators should maintain the information as part of their maintenance program.
a. Software Assurance. All software used in IMA systems should be developed to the
guidance of RTCA/DO-178B, Software Considerations in Airborne Systems and Equipment
Certification, dated December 1, 1992, or another acceptable means of compliance, as agreed to
between the applicant and the cognizant FAA Aircraft Certification Office (ACO).
b. Software Levels. The software levels for all software should be determined by the
appropriate safety assessments (see section 9 of this AC) and any additional requirements, such
as those specified by functional TSOs.
(1) Many IMA systems utilize Field-Loadable Software (FLS) as part of the
TC/STC/ASC/ASTC installation. FLS is software that can be loaded without removal of the
equipment from the aircraft installation. FLS might also include software loaded into a line
replaceable unit (LRU) or hardware element at a repair station or shop. FLS can refer to either
executable code or data. When obtaining certification approval for utilization of the FLS
capability, the applicant should consider the following guidance:
(a) The FLS should meet the objectives and guidance of RTCA/DO-178B or
another acceptable means of compliance, as agreed to between the applicant and the cognizant
ACO.
(b) The software should be loaded on the target computer and hardware
configuration that the software was verified on for the approval.
(c) To ensure that the FLS is loaded in the proper configuration, there must be a
robust automated configuration management scheme (as described in paragraphs 10b through
10e of this AC) to ensure that the installation configuration (that is, software part number(s), the
hardware part number(s), the aircraft model, and the aircraft serial number combination, as
applicable) is the configuration approved during the TC, ATC, STC, ASTC, or TSO
authorization process.
(d) If redundant functions of the IMA system are field-loadable, the applicant
should ensure that the redundant functions have the same software configuration, unless
intermixing of different software configurations is supported by the safety assessment and has
been approved for the aircraft configuration and type design.
Page 17
AC 20-145 2/25/03
(e) There should be a process to assure that the software loaded is the software
approved and that it has not been corrupted (for example, verification with an appropriate data
transfer integrity check, such as a cyclic redundancy check). Different data integrity algorithms
give different assurances that the data transferred are correct. The applicant should assure that
the algorithm used is commensurate with the integrity required for the software level of the data
being loaded.
(f) If the applicant proposes more than one medium for loading of FLS (such as
diskette, mass storage device, or compact disk), loading from all mediums should comply with
the guidance in this section.
(g) The applicant should demonstrate the ability to verify the airborne equipment
software part numbers with onboard equipment, carry-on equipment, an automated configuration
management system, or other appropriate means.
(i) If FLS is loaded onto a hardware element that previously had software loaded,
the out-of-configuration software component(s) on the hardware element should be removed
prior to loading the new FLS, in order to prevent the existence of unapproved or out-of-
configuration code.
(j) All changes to FLS should be submitted to the cognizant ACO for review and
approval.
(a) The aircraft and hardware applicability and intermixability allowances for
redundant systems that load software.
(b) Verification procedures to ensure that the software was correctly loaded into an
approved and compatible target computer and memory device(s).
(c) Any post load verification and/or test procedures required to show compliance
to the guidelines specified in this AC.
(d) Actions to be taken in the event of an unsuccessful load (for example, prohibit
dispatch of aircraft).
Page 18
2/25/03 AC 20-145
(1) IMA systems may combine many functions of different software levels on the same
target computer or hardware element. Per RTCA/DO-178B, higher-level software must be
partitioned and/or protected in such a way that lower-level software cannot affect the memory
locations allocated to the higher-level software or otherwise interfere with the computation of its
functions (that is, there must be both time and space protection). It should be noted that
functions operating on the same hardware may need to be partitioned and/or protected to support
fail-safe designs and safety requirements, even if they are the same software level. It is
recommended that design features that implement protection and partitioning use both hardware
and software means.
(2) IMA systems typically contain many functions, often using the same computer
resources (for example, real-time operating systems, memory, and input/output devices). A
function can affect the operation of other functions by affecting the timing, the space (that is,
memory), or the performance behavior of the other functions. When partitioning is used as the
means of protection for the computer resources in an IMA system, the applicant should
demonstrate the partitioning in both the time and space domains.
(3) As a minimum, when evaluating timing properties, the following items should be
considered to demonstrate that functions either have no effect or that their effect is acceptable
based on the identified safety parameters:
(b) Loops (for example, infinite loops or indirect non-terminating call loops).
(c) Real-time correspondence (for example, frame overrun, interference with real-
time clock, counter/timer corruption, pipeline and caching, deterministic scheduling).
(e) Control flow defects (timing aspects) (for example, incorrect branching into a
partition or protected area, corruption of a jump table, corruption of the processor sequence
control, corruption of return addresses, unrecoverable hardware state corruption (for example,
mask and halt)).
Page 19
AC 20-145 2/25/03
(4) As a minimum, when evaluating space properties, the following items should be
considered to demonstrate those functions either have no effect or that their effect is acceptable
based on the identified safety parameters:
(c) Corruption of internal data (for example, direct or indirect memory writes,
table overrun, incorrect linking, calculations involving time, or corrupted cache memory).
(g) External device interaction (for example, loss of data, delayed data, incorrect
data, or protocol halts).
(h) Control flow defects (space aspects) (for example, incorrect branching into a
partition or protected area, corruption of a jump table, corruption of the processor sequence
control, corruption of return addresses, or unrecoverable hardware state corruption).
(1) The software life cycle data being considered for reuse has not changed since its
previous approval.
(2) The required software level of the software application(s) is equal to, or less than,
the software level of the previous approval.
(3) The range and data type of inputs to the configuration item are equivalent to its
approved predecessor.
(4) The configuration item being reused is resident on the same target computer and
used in the same way operationally as it was for the previous approval.
Page 20
2/25/03 AC 20-145
(5) Equivalent software/hardware integration testing and system testing were conducted
on the target computer and system as in the previous approval.
(6) Software life cycle data have been shown to have no adverse effect on (1) the
original systems safety margins and (2) the original operational capability, unless accompanied
by a justifiable increase in safety. If software life cycle data intended for reuse adversely affect
safety or exceed a pre-approved range of data, parameters, or equipment performance
characteristics, then it will not be approved for reuse. The software life cycle data would require
design approval under the applicable paragraph of 14 CFR.
(7) All open problem reports and in-service problems associated with the software to be
reused should be analyzed to ensure that there are no safety or operational issues.
(1) IMA cabinet or rack installations should show compliance with XX.1357 (where
XX may be 14 CFR parts 23, 25, 27, or 29) or provide supporting data to justify an equivalent
level of safety finding. For part 25 aircraft, circuits that do not directly comply with 25.1357(e)
may be acceptable if the failure effects are minor.
(2) Design of the physical architecture should support the ability to manage smoke or
fire without losing functions whose loss is catastrophic.
(3) The IMA cabinet or rack should not be powered with circuit protection features that
are under control of that IMA cabinet or rack.
(4) If redundant IMA hardware elements are used to provide functions, individual non-
resettable fuses or circuit breakers may be provided for each IMA hardware element. The
applicant should provide supporting data in the aircraft-level SSA to verify that operation of the
circuit device does not cause a loss of a function. The applicant must provide an analysis to
demonstrate appropriate availability in compliance with XX.1309 (where XX may be 23, 25, 27,
or 29) to justify an equivalent level of safety finding.
Page 21
AC 20-145 2/25/03
activation of the recovery feature. Effects of recovery feature activation in normal and failed
conditions must be evaluated for all phases of flight.
c. Built-In Test (BIT). BIT features are recommended to limit exposure time to latent
failures. If pilot-initiated BIT features are provided, there should be provisions (for example,
interlocks) to prevent interference with control functions (for example, flight controls, autopilots,
and engine controls). Activation of BIT features intended only for ground operations should be
inhibited during flight.
e. Failure Detection and Annunciation. Failures that affect functions provided by the
IMA system should be detected and annunciated to the flight crew with alerting and indication
means for warning, caution, or advisory information appropriate for the failure effects.
g. Functional Isolation. To enable continued use of the working IMA functions in the
event of a failed function, it is recommended that IMA systems that integrate multiple functions
incorporate a means that allows the failed function(s) to become disabled while other working
functions remain operational.
i. Visual and Aural Alerting. Because of the integrated nature of IMA systems, the
visual and aural alerting systems must be carefully designed and evaluated. For example:
(1) The presentation of visual and aural alerts should be prioritized (including
addressing simultaneous alerts).
(2) A means should be provided to disable nuisance and distracting aural and visual
alerts. There should be an annunciation to the flight crew that the alerts have been disabled, until
they are rearmed.
(3) The visual and aural alerts should be included as part of the human factors and
flight crew interface evaluations.
Page 22
2/25/03 AC 20-145
RTCA/
RTCA/DO-160D TSO-C153 Functional TSO or Aircraft
DO-160D
Section Title Requirement Installation Requirement
Section #
4 Temperature and Altitude – Not tested Yes
Temperature
4 Temperature and Altitude – Altitude Yes Yes, TSO-C153 qualification
data may be used by similarity
5 Temperature Variation Not tested Yes
6 Humidity Yes Yes, TSO-C153 qualification
data may be used by similarity
7 Operational Shock and Crash Safety – Not tested Yes
Operational Shock
7 Operational Shock and Crash Safety – Yes Yes, TSO-C153 qualification
Crash Safety data may be used by similarity
8 Vibration Not tested Yes
9 Explosion-proofness Yes, if appropriate Yes, TSO-C153 qualification
data may be used by similarity
10 Waterproofness Yes, if appropriate Yes, TSO-C153 qualification
data may be used by similarity
11 Fluid Susceptibility Yes, if appropriate Yes, TSO-C153 qualification
data may be used by similarity
12 Sand and Dust Yes, if appropriate Yes, TSO-C153 qualification
data may be used by similarity
13 Fungus Resistance Yes, if appropriate Yes, TSO-C153 qualification
data may be used by similarity
14 Salt Spray Yes, if appropriate Yes, TSO-C153 qualification
data may be used by similarity
15 Magnetic Effect Yes Yes, TSO-C153 qualification
data may be used by similarity
16 Power Input Not tested Yes
17 Voltage Spike Yes Yes, TSO-C153 qualification
data may be used by similarity
18 Audio Susceptibility – Power Inputs Yes Yes, TSO-C153 qualification
d b d b i il i
Page 23
AC 20-145 2/25/03
RTCA/
RTCA/DO-160D TSO-C153 Functional TSO or Aircraft
DO-160D
Section Title Requirement Installation Requirement
Section #
data may be used by similarity
19 Induced Signal Susceptibility Not tested Yes
20 Radio Frequency Susceptibility Not tested Yes
21 Emissions of Radio Frequency Energy Not tested Yes
22 Lightning-Induced Transient Not tested Yes
Susceptibility
23 Lightning Direct Effects Not tested Yes
24 Icing Yes Yes, TSO-C153 qualification
data may be used by similarity
25 Electrostatic Discharge Yes Yes, TSO-C153 qualification
data may be used by similarity
b. Certain EQTs cannot be appropriately performed on the hardware elements as part of the
TSO-C153. Those EQTs can only be appropriately performed when the IMA system and
hardware elements are arranged in the configuration specified for the applicable aircraft, as
defined for the aircraft TC, STC, ATC, or ASTC. Also, those EQTs can only be appropriately
performed with the functional software components installed and operating. Therefore, certain
RTCA/DO-160D EQTs are excluded from the TSO-C153. These EQTs must then be addressed
as part of the functional TSO compliance, or as part of the TC/STC/ATC/ASTC environmental
qualification. These tests are described below:
(1) The EQT for temperature (RTCA/DO-160D, Section 4) and temperature variation
(RTCA/DO-160D, Section 5) should be performed with the cabinet or rack and modules in the
hardware configuration intended for the functional TSO authorization or the
TC/STC/ATC/ASTC approval. For temperature and temperature variation tests performed for
the functional TSO or TC/STC/ATC/ASTC, the hardware module arrangement should represent
the expected worst-case temperature conditions. As an alternate approach, the functional TSO or
TC/STC/ATC/ASTC applicant may perform engineering analysis of the thermal characteristics
of the expected cabinet or rack and module configuration variations to determine temperature test
parameters that exceed the worst-case expected temperature conditions. These temperature test
parameters could be used instead of the standard RTCA/DO-160D, Sections 4 and 5 temperature
conditions.
(2) The EQT for operational shock (RTCA/DO-160D, Section 7) and vibration
(RTCA/DO-160D, Section 8) should be performed with all cabinet or rack module positions
(slots) occupied in the hardware configuration specified for the functional TSO or
TC/STC/ATC/ASTC installation. An alternate approach would be to perform an engineering
analysis of the characteristics of the expected cabinet or rack and module configurations to
determine vibration and operational shock test parameters that exceed the worst expected
Page 24
2/25/03 AC 20-145
conditions. These test parameters could be used instead of the standard RTCA/DO-160D,
Sections 7 and 8 conditions.
(3) The EQT for induced transients (RTCA/DO-160D, Section 19), Radio Frequency (RF)
susceptibility (RTCA/DO-160D, Section 20), RF emissions (RTCA/DO-160D, Section 21), and
lightning-induced transients (RTCA/DO-160D, Section 22) are most appropriately performed
with the hardware elements and software components loaded and active in the IMA system. This
is because the response of the system may be highly dependent on the hardware element position
and software component configuration. Therefore, these EQTs should be performed as part of
the functional TSO compliance or as part of the TC/STC/ATC/ASTC environmental
qualification.
(4) IMA systems should have lightning and HIRF protection EQTs performed with the
hardware elements and software components loaded in the configuration specified for the
applicable aircraft, per the lightning regulations and ACs and the HIRF policy. The interface
wiring and connected equipment must be representative of the wiring and connected equipment
intended to be installed in the aircraft.
d. The functional TSO qualification data sheet should state explicitly the RTCA/DO-160D
test categories and tests that are performed in the functional TSO configuration and the test
categories and tests that are performed in the TSO-C153 configuration. This information should
also be included in the installation instructions.
e. Hardware elements and software components providing a function that does not have an
applicable functional TSO must meet the TC/STC/ATC/ASTC environmental requirements.
f. All hardware elements must be evaluated prior to installation to ensure that the
TC/STC/ATC/ASTC environmental qualification requirements have been satisfied.
(1) This section provides guidance to identify and, in some cases, resolve human factors
and flight crew interface issues of IMA systems. It addresses issues with the design of
Page 25
AC 20-145 2/25/03
TSO-C153 hardware elements and the installation and integration of such elements into the
aircraft. The installation and integration of an end-state, fully integrated IMA system is also
addressed in this section.
(2) Because IMA systems contain many unique issues, applicants should develop a plan
early in the program to address human factors and flight crew interface issues. The plan should
document how issues will be identified, tracked, and resolved throughout the life cycle of the
program. Typically, this information is documented through either a Human Factors
Certification Plan or through a general certification plan in which the human factors components
are identified.
b. Potential Human Factors and Flight Crew Interface Issues with IMA Systems.
(1) Displays and associated flight deck controls typically pose the greatest challenges
for human factors and flight crew interfaces in IMA systems. This section addresses the most
common issues, but does not comprehensively address all potential human factors and flight
crew interface issues with an IMA system. IMA systems have many novel aspects; therefore,
new issues arise with each project.
(2) Guidance in this section is intended to supplement the previously published material
(as listed in section 2 of this AC) and provide awareness of the issues that applicants should
consider. Thus, where relevant regulatory or advisory materials exist, they are referenced, and
where none exists the issue is noted along with a recommended resolution path, where one has
been established.
(a) In the past, electronic checklists were passive; that is, they only monitored
system status and then allowed check-off (either manually or automatically) of the item when it
was accomplished by the flight crew. In order to address the workload and task timeline issues
with integration of utility system controls (including fuel, electrical, pneumatic, air conditioning,
and pressurization), the applicant may use electronic checklists. These allow the flight crew to
click on the checklist item (to call up the system synoptic display), move the cursor to the
Page 26
2/25/03 AC 20-145
synoptic display, and position the cursor on required control function on that display. One good
aspect of this approach is a reduction in errors associated with selecting the wrong control.
However, a significant potential human factors and flight crew interface issue is system
awareness, because overloaded or complacent pilots may adopt a “click, click, click, … checklist
complete” habit and lose awareness of the consequences of the individual items. This is even
more significant because of the small amount of display area that may have been reserved for the
checklist (which may result in little room for expanded explanations of procedure steps).
(b) The FAA’s Flight Standard Service normally handles the post-TC approval of
user-modifiable checklists without the need of a design change. However, it is recommended
that checklists that interact with aircraft systems not be user-modifiable, because they may
require design changes to other aircraft systems and additional human factors evaluations.
(c) Automatic control of aircraft functions through the electronic checklist is not
recommended.
(a) As more and more functions are being controlled using multi-purpose controls
(such as, Cursor Control Device (CCD) or Multifunction Control and Display Unit (MCDU)),
the flight crew must step through more menus to access functions that had previously been
immediately accessible using dedicated controls. For example, applicants may propose to use the
CCD to control all radios (with the MCDU as a backup). This may take several steps to do
something that previously took only one control action (such as, turning a single knob). While
some shortcuts have been developed for on-side radios, there can still be more steps than
required for conventional radio control panels.
(b) Quick access to various functions can be an important issue, considering that
many other functions may be performed using the CCDs and other multifunction controls.
(c) Increased sharing of the MCDU may also cause problems. For example, an
applicant design may propose to use the MCDU as the control and display device for the solid-
state circuit breakers. This would require time-sharing with all of the other functions (for
example, Flight Management System, datalink, display of maintenance data, backup tuning of
communication/navigation radios, and so forth) that currently are hosted on the MCDUs.
(d) It is important to evaluate this decrease in accessibility across all flight deck
functions, in addition to evaluating it on a case-by-case basis. The cumulative effects on
workload, task timelines, interference across functions, and flight crew coordination may be
significant.
(a) Controls used in IMA systems pose a number of potential human factors and
flight crew interface issues. Specifically, a variety of cursor-based controls may be used with
Page 27
AC 20-145 2/25/03
“point-and-click” graphical user interfaces for certain flight crew functions. Examples of cursor-
based control technologies include touch-pads, joysticks, force-sensitive two-axis buttons
(similar to those embedded in some laptop computer keyboards), and trackballs. A number of
cursor-based control issues to be addressed are included below:
b. In some designs, certain of these controls are labeled (on the display)
with icons (symbols) in lieu of text. While a limited number of control functions may have icons
associated with them that one could reasonably assume the pilot could recognize, most functions
may have no universally accepted icons. Therefore, the association between the icons and the
controlled function will require flight crew training and memorization. The use of such icons in
lieu of text should be kept to a minimum.
Page 28
2/25/03 AC 20-145
Page 29
AC 20-145 2/25/03
electrical system will be grouped together. However, when some controls are moved from the
discrete or dedicated control panels, some of the system’s controls may now be accessed by the
CCD and main displays, while other controls for that same system may remain in the overhead
panel. For example, most electrical system controls (such as bus switching) would be controlled
by the CCD, while the generator drive disconnect switches are likely to stay in the overhead
panel due, in part, to the irreversible nature of the control. Thus, the flight crew would have to
go to different locations for various electrical system controls. This scattering of system controls
may result in flight crew confusion in critical, high workload/stress failure scenarios.
Compliance with 14 CFR § XX.777a should be shown (where XX may be 23, 25, 27, or 29).
c. Testing Considerations for Human Factors and Flight Crew Interface Issues.
Cursor-based control evaluations should include scenarios involving manual flight, emergencies,
multiple failures, turbulence, vibration from sustained engine imbalance (blade-out), and so
forth. Scenarios should involve testing of all cursor-based control functionality, including when
the flight crew might use the cursor-based control to select displays, position the cursor, select
from menus, and navigate through menu trees to access control functions (see also section 17 of
this AC for testing considerations). Testing the acceptability of the IMA cursor-based control
system should focus on each of the issues discussed in the section above, as well as on
determining compliance with the regulations, as partially discussed in the following section.
(a) To comply with 14 CFR §§ 25.777(a) and 25.1523, the applicant must show
that the flight crew can conveniently access required controls in all expected flight scenarios,
without unacceptable disruption of aircraft control, crew task performance, and Crew Resource
Management. Since not all possible scenarios can be evaluated, the applicant should develop a
set of worst-case scenarios for evaluation, along with proposed methods for evaluation (such as,
analysis, test, and demonstration). Comparison to conventional controls is considered an
important aspect of this evaluation, in order to determine if the use of cursor-based controls
results in an increase in flight crew workload or task timelines. The evaluation plan should show
how each of the factors identified in 14 CFR part 25, Appendix D will be evaluated. Operation
of the cursor-based control with both the dominant and non-dominant hand should be included in
Page 30
2/25/03 AC 20-145
the evaluations. Additionally, experience has shown that control-display response lag (time
delay between movement of the control and response of the cursor) and control gain
characteristics can be critical in the acceptability of a cursor-based control. Therefore, usability
testing should accurately replicate the response lag and control gain characteristics that will be
present in the actual aircraft.
(b) To show compliance with 14 CFR § 25.771(e), the applicant should show by
test and/or demonstration in representative motion environment(s) that the cursor-based control
is acceptable for controlling all functions that the flight crew will access using the cursor-based
control during these conditions. In addition to turbulence, vibration due to the loss of a fan blade
and the subsequent damage to other rotating parts of the fan and engine must be considered in the
definition of the motion environment.
(c) To show compliance with 14 CFR §§ 25.1309(b) and (d), the applicant must
conduct an aircraft-level safety assessment to determine the hazards and failure conditions
associated with the failure of one and of both cursor-based controls. Particular attention should
be paid to the independence of the two cursor-based controls (that is, vulnerability to common-
cause failures), and to the combined effects of the loss of control of multiple cursor-based
systems and functions. The applicant should demonstrate that the failure of either cursor-based
control does not unacceptably disrupt operation of the aircraft (that is, the allocation of flight
crew tasks) in normal and emergency conditions. The failure condition classifications described
in SAE ARP4761 can be used to assess the severity of the effect on the aircraft and on flight
crew operations of the loss or malfunction of a single cursor-based control or the loss or
malfunction of both cursor-based controls, either by themselves or in combination with other
failures. In conducting the safety assessment, the failure conditions that could result in the
failure or anomalous behavior of a cursor-based control should include fluid contamination,
unless it can be shown that spills of fluids expected to be present in the flight deck (for example,
coffee and syrup) will not result in cursor-based control failure or anomalous behavior, or in
degraded flight crew usability of the cursor-based control. The safety assessment should also
include common mode failures such as physical damage, HIRF, lightning, fire, and electrical
faults.
1. That pilots are able to quickly and reliably identify what item on the display
is “active” as a result of cursor positioning, as well as what that function will perform, if the item
is selected using the selector buttons and/or changed using the multifunction knob.
2. That pilots will correctly identify and select the control functions, at a speed
and error-rate that is equivalent to or better than that of controls that are labeled with text
formats. The data required to substantiate that the speed and error rate is equivalent need not be
objective data; the applicant may collect subjective data from test subjects to show that the
design meets this standard.
Page 31
AC 20-145 2/25/03
17. TESTING PRACTICES. This section describes hardware element testing, individual
system testing, IMA system integration testing, aircraft ground testing, aircraft flight testing, and
maintaining configuration control of test plans/procedures/results. The applicant(s) should
develop test plans for each of the appropriate testing categories. The test plans should be
coordinated with and approved by the cognizant ACO. In addition to normal certification testing,
the following testing should be addressed for IMA systems, as a minimum.
(1) Testing of the hardware elements should be accomplished by TSO testing for
TSO-C153 and functional TSOs.
(2) Additional tests required for the installation of the hardware elements that were not
performed for TSO compliance (for example, additional environmental qualification or hardware
device testing) should be conducted.
(3) Hardware elements that have functionality not addressed by a functional TSO
should be tested to the aircraft system performance and environmental specifications.
(1) Individual functions (for example, Flight Management System, braking system)
within the overall IMA system should be tested with associated power, controls, sensors, and
displays.
(c) Hardware and software integration testing for the specific system and
functions.
Page 32
2/25/03 AC 20-145
(d) Functions and features testing (for example, “functions” include things like
GPS navigation, while “features” are parts of the system, such as a zoom-in button).
(e) BIT versus external test equipment (for example, an Instrument Landing
System test set or a Traffic Alert and Collision Avoidance System test set) to assure correct
interfacing.
(5) Robustness testing to verify that the system responds correctly to abnormal
conditions, such as corrupted or invalid data inputs, and to ensure that assumptions made during
the safety assessment and system design are valid.
(1) This testing addresses the integration of all hardware elements, functional software,
displays, controls, sensors, power sources, and other IMA system components representing the
configuration intended for aircraft certification.
(2) Typically, the same issues are addressed as in the individual system testing, plus the
addition of functional compatibility and interoperability among systems.
(4) HIRF testing should be performed as part of the system integration tests for systems
whose failures may contribute to catastrophic or hazardous failure conditions for the aircraft or
engine.
(5) Lightning testing should be performed as part of the system integration tests for
systems whose failures may contribute to major, hazardous, or catastrophic failure conditions for
the aircraft or engine.
(6) System integration testing provides another opportunity for human factors and flight
crew interface evaluations. This enables timely identification of human factors and flight crew
interface issues so that changes can be made with acceptable technical, schedule, and economic
impacts. It allows for FAA evaluation of the design to instill confidence in the applicant’s design
decisions and to potentially reduce certification risks.
Page 33
AC 20-145 2/25/03
(1) The applicant should submit a ground test plan. Hardware elements must be
installed and software components loaded in the conformed configuration that represents the
intended type design. Ground tests should evaluate the high temperature extremes and may
evaluate the low temperature operating conditions.
(4) Some human factors and flight crew evaluations may be performed on the ground
(for example, night lighting, equipment location, and hazardous system malfunctions).
(5) Ground testing should also include IMA system testing with simulated malfunctions
or losses, where possible. This testing should verify that functions are not affected during
malfunction and/or loss of other independent systems and hardware elements, including loss of
power (for example, that none of the non-GPS IMA systems are affected by a GPS hardware
module failure). These tests should be a subset of the integration testing addressed in
paragraph 17c(8) above.
(6) Compliance of colors of advisories, cautions, and warnings with the regulations
(such as 14 CFR § XX.1322) and applicable guidance of advisory materials (for example,
AC 25-11). Portions of alerting system evaluation may be performed during flight-testing.
Page 34
2/25/03 AC 20-145
installation should be evaluated by flight testing for compliance with the applicable airworthiness
regulations (for example, 14 CFR parts 23, 25, 27, or 29) and impact on crew workload:
(1) Evaluation of functions, features, and abnormal modes of the IMA system.
(4) Evaluation of pilot visibility of each required instrument from each pilot station, to
include normal and reversionary modes.
(5) Human factors aspects of control system (for example, cursor-based control or other
control devices, location and accessibility of controls).
(6) Any tests unique to the new equipment or new/novel functions. This should include
simulated IMA system failures and the capability of the backup systems to take over without
interruption.
(7) Electrical bus switching. This testing should include monitoring the response of the
different IMA systems with bus interruptions and transients.
NOTE: Flight test personnel should also evaluate the AFM or AFMS
procedures and limitations to ensure that they are accurate and support
the safety assessment.
f. Configuration Control During Flight Testing. Because of the dynamic and complex
nature of IMA system configuration, “red label” units are often used during the certification
flight-testing. The hardware elements and software configurations may change several times
during the flight test program. Therefore, the applicant should define an IMA system
configuration control process to use during the certification flight test program. This process
should include “flight test conformity,” as well as a means of ensuring that the final product
conforms to what was tested, and that the test results for configurations tested that were different
than the final IMA system configuration are valid. Examples of items to be addressed in the
process are:
(1) Inclusion of the aircraft-level safety assessment and a summary of each function’s
criticality and worst-case failure conditions.
(2) A process to identify and control the configuration of each hardware element and
software component of the IMA system during the certification flight test program.
Page 35
AC 20-145 2/25/03
(3) A process for analyzing the interoperability effects of all changes during the flight
test program. For example, a process to determine how changes to some software components
may affect other software components or functions in the IMA system.
(4) A change impact analysis process for analyzing the effect of changes during the test
program on the aircraft-level safety assessment and other systems, and the validity of previously
conducted tests.
(5) A process for analyzing the effect of every change on the overall functionality of the
final IMA system and the validity of previous test results.
(2) Build MPS in accordance with TSO-C153. Ensure that all the appropriate items in
TSO-C153 Appendix 1 have been documented and approved by the FAA.
(5) Design and build hardware elements per TSO-C153 and the MPS.
(6) Perform the tests necessary to demonstrate compliance with TSO-C153 and the
MPS. If special purpose test software is used for environmental qualification testing, the
manufacturer must verify, validate, and control the configuration of the hardware elements and
software components to ensure the validity of the testing
Page 36
2/25/03 AC 20-145
(7) Submit the data package (that is, information in Section 5 of TSO-C153, including
the MPS) to the cognizant FAA ACO for review and issuance of TSO authorization.
(8) Apply for changes to TSO-C153 elements, as design changes occur. Notify TC,
STC, ATC, ASTC holder and/or functional TSO holder of the design change.
(2) Design the system in accordance with the appropriate TSO standards.
(3) Identify and address all integration and installation issues with the TSO-C153 and
TC/STC/ATC/ASTC applicants.
(4) Develop a mapping between the TSO requirements and the system implementation
(for example, a mapping matrix). The mapping should identify TSO requirements that are fully
met, partially met, or not met at all.
(5) Reference Order 8150.1 (see the most current edition), as needed.
(6) Identify functions in the IMA system that are not addressed by the TSO. These
functions may require deviations and must be addressed by the TC/STC/ATC/ASTC applicant.
(8) Submit the data package required by the functional TSO to the cognizant FAA ACO
for review and issuance of TSO authorization. The installation data are included as part of the
data package and should include the configuration of the functional TSO submitted for
authorization.
(9) Apply for changes to functional TSOs, as design changes occur. Notify TC, STC,
ATC, and ASTC holder of the design change.
Page 37
AC 20-145 2/25/03
NOTE: Due to the high integration, functional TSO data packages for
IMA systems are typically developed in parallel with the
TC/STC/ATC/ASTC effort. In these cases, TSO data should not be
submitted to the ACO for authorization until the TC/STC/ATC/ASTC
testing is completed.
(1) Develop and submit a Project-Specific Certification Plan (PSCP) for the IMA
system to the cognizant ACO for approval.
(a) It is recommended the PSCP include a detailed conformity plan that addresses
all hardware elements and software components’ conformity and installation conformity
inspections (including the plan for addressing any “red label” units).
(b) The PSCP should clearly identify what functions will and will not be approved
through the TSO authorization process. This is necessary in order to clarify the approval process
(that is, to identify what will be TSO authorized and what will be TC/ATC/STC/ASTC
approved).
(c) The PSCP should address integration and installation of all components of the
IMA system (including all hardware elements and software components).
(3) Perform aircraft-level safety assessment per section 9 of this AC and submit to
ACO.
(5) Ensure that all TSO assumptions are not violated in the installation (for example,
relocation of a GPS hardware module does not invalidate environmental qualification credit for
the GPS TSO).
(7) Develop field-loading procedures to ensure that proper software is loaded on the
aircraft (see section 10g of this AC).
(8) Verify that software and complex electronic hardware issues were properly
addressed for the installation per sections 12 and 13 of this AC.
Page 38
2/25/03 AC 20-145
(9) Determine appropriate aircraft environmental conditions and ensure that EQTs were
performed (see section 15 of this AC).
(10) Develop test plans and perform necessary tests, including those addressed in
section 17 of this AC.
(11) Develop a plan for addressing human factors issues and perform human factors and
flight crew evaluations of the IMA system, as described in section 16 of this AC.
(12) Ensure that the IMA system meets all airworthiness requirements (see section 20 of
this AC).
(13) Submit all appropriate certification data (for example, safety assessments, hardware
design assurance data, software data, test plans, test results, compliance reports) to ACO for
approval.
(14) Maintain aircraft system configuration management per sections 10 and 11 of this
AC.
(15) Evaluate and document changes to IMA system and elements per 14 CFR § 21.93.
(16) Ensure that aircraft design features address safety and comply with the regulations
(see section 14 of this AC).
(17) Evaluate third-party hardware modules and/or any software installed in the IMA
system and demonstrate compliance to regulations (see section 19 of this AC).
a. Third-party hardware modules may or may not obtain TSO-C153 authorization. In order
to not violate the TSO-C153 authorization granted for the rack or cabinet, the third-party
manufacturer’s hardware module must be shown to meet the environmental, interoperability,
configuration management, and regulatory requirements of the installation. The third-party
hardware module must also participate in the robust automated configuration management
Page 39
AC 20-145 2/25/03
system by providing configuration identification information to the system. This requires close
cooperation between all stakeholders involved.
c. Some third-party hardware module manufacturers will not apply for any TSO
authorization (neither TSO-C153 authorization nor a functional TSO authorization). This might
happen because a functional TSO authorization doesn’t exist (for example, braking system or
power distribution system) or because a TSO authorization isn’t desirable. Such hardware
modules will be approved as part of the TC/STC/ATC/ASTC. The environmental,
interoperability, configuration, and regulatory requirements must be demonstrated as part of the
TC/STC/ATC/ASTC process. Regardless of the approach taken by the third-party manufacturer,
third-party hardware modules should be evaluated at the installation level to verify that all
requirements are met. Third-party manufacturers are suppliers to the TC/STC/ATC/ASTC
applicant and must be controlled during production by the applicant’s quality assurance
organization.
e. All hardware modules installed into a TSO-C153 authorized rack or cabinet should have
a data sheet, similar to the one shown in Appendix 2 of TSO-C153. A manufacturer can submit
data in a different format, but it must contain all of the information listed in Appendix 2 of the
TSO-C153. If a particular portion of the data sheet does not apply, mark it “Not Applicable.”
Page 40
2/25/03 AC 20-145
a. Initial Installation. For initial approval of a particular equipment installation, the scope
of the applicant’s program should be directed toward airworthiness approval through the TC or
STC process. This AC is also appropriate for applicants who exercise their Delegation Option
Authorization (DOA), Organizational Designated Airworthiness Representative (ODAR), or
Designated Alteration Station (DAS) authorization for STC approval. As part of the ATC or
ASTC program, the applicant should determine if the changes to the type certificated aircraft
constitute a significant change, but not one so extensive as to require a new TC in accordance
with 14 CFR § 21.19. If the design change is considered significant, the certification program
should be coordinated with the responsible FAA Directorate and cognizant ACO, as described in
FAA Order 8110.4 (see the most current edition).
b. Follow-on Installations. For equipment that has already obtained initial installation
approval by the TC or STC process, approval may be obtained using either the STC, ATC,
ASTC, or FAA Form 337, Major Repair and Alteration, process subject to the restrictions of
paragraph (1) below.
(1) For installations on aircraft operated under 14 CFR part 91 and with the applicant
providing acceptable IMA system installation or alteration instructions, approval for return to
service can be accomplished using FAA Form 337. Because of the complexity of IMA systems,
the FAA Form 337 should be limited to return to service. Installation variations acceptable for
approval by FAA Form 337 must not impact system or aircraft operation (for example, slight
location changes, minor fastener changes, and so forth, could use the FAA Form 337 process).
Therefore, it is recommended that the FAA Form 337 process be limited to minor aircraft
installation variations from a TC/STC/ATC/ASTC that approves an IMA system for that
particular aircraft model. Any operational variation in installation should only be accomplished
by STC or amended TC.
NOTE: Part 121 operators and Part 145 repair stations may not
require FAA Form 337 for return to service, because their return to
service method is specified in their FAA-approved manuals.
(2) When using the STC or ATC process, all required data pertaining to the installation
should be submitted to the ACO. These data should include the manufacturer’s operating and
installation or alteration instructions, safety analysis for the installation or alteration, installation
or alteration details, structural substantiation, system wiring diagrams, ground test plans, flight
test plans, and test results, as a minimum.
(3) Because of the complexity of IMA system installations and alterations, it is highly
recommended that initial DAS and DOA/ODAR IMA projects have significant ACO
participation.
Page 41
AC 20-145 2/25/03
c. Change Impact Analysis. When a change is made to the IMA system, a change impact
analysis should be performed. The change impact analysis should determine whether the change
could adversely affect safe operation of the system or product. The following are examples of
areas that could have an adverse impact on safety or operation:
(c) Software levels or electronic hardware device design assurance levels are
changed.
(2) Operational or procedural characteristics of the aircraft are changed in a manner that
could adversely affect flight safety as a result of the software change. For example:
(3) New functions or features are added to the existing system functions that could
adversely impact flight safety.
Page 42
2/25/03 AC 20-145
(4) Processors, interfaces, and other hardware components or the environment are
changed in such a way that safety could be adversely affected. See RTCA/DO-178B,
Section 12.1.3, and RTCA/DO-254, Sections 11.1 and 11.2.
(5) Life cycle data (for example, requirements, code, and architecture) are significantly
changed in such a way that it could adversely affect safety.
d. Change Classification. The change impact analysis should be used to justify minor or
major classification of the change. The major and minor change classification procedures should
also evaluate the interoperability of the changed components. The TC/STC/ATC/ASTC holder
must control all changes, regardless of the classification.
Page 43
2/25/03 AC 20-145
(1) The MMEL may need to be revised to address the IMA system hardware or
software changes. Once the MMEL addresses the IMA equipment changes, it may be submitted
to the FAA for approval.
(2) The FAA approving office (for example, Flight Standards District Office) should
coordinate with ACO engineering when evaluating the revised MMEL.
Page 43
2/25/03 AC 20-145
Appendix 1
The following is a partial list of the FAA TSOs that might be considered as functional TSOs in
IMA systems. Note that applicants may apply for a TSO that does not adequately address all of
the functionality in the system. Alternatively, applicants may apply for multiple TSOs, since no
single TSO applies to all functions. If the applicant applies for multiple TSOs for a single
system, that combination of TSOs may result in the system being considered complex or
integrated, even though the individual TSOs were not.
NOTE: The revisions of TSOs may change. This list is only for
reference purposes. Applicants should ensure that they are using the
appropriate TSO revision.
Page 1