103

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Describe the seven layers of the OSI model Remember: All People Seem To Need Data Processing

7-Application - N/A (APIs) 6-Presentation - N/A (data conversion) 5-Session - N/A (session tracking/naming) 4-Transport - N/A (assembly/disassembly software) 3-Network - Router (Ethernet/DOCSIS/etc) 2-Data Link - Bridge, switch, NIC (Logical Link Control and Media Access Control) 1-Physical - Cabling, hubs, NIC* (anything that moves data from one system to another, such as copper cabling, fiber optics, or even radio waves)

T1

A dedicated connection supporting data rates of 1.544Mbps. A T-1 line actually consists of 24 individual channels, each of which supports 64Kbps. Each 64Kbps channel can be configured to carry voice or data traffic. T-1 lines are a popular option because they allow for Internet connectivity. The Internet backbone itself consists of faster T-3 connections.

ISNS

A. Integrated Shipboard Network System (ISNS) Current networking system and architecture used by the Navy for information technology. ISNS provides real-time information/data exchange within the ship and between afloat units, component commanders, ashore commanders and fleet commanders,

DSN

A.Defense Switched Network (DSN) Provides the worldwide non-secure voice, secure voice, data, facsimile, and video teleconferencing services for the federal government. Administered by the Defense Information Systems Network (DISN).

Explain the function of proxy

Acts as an intermediary for requests from clients seeking resources from other servers and connection to endpoint devices.

MAC OS

Apple

Process for Network Expansion and the Configuration Baseline Change per DoN CIO

Baseline assessments done annually All updates or changes to baseline require approval Network expansion plan is in accordance with configuration management plan set forth by DoN CIO

Procedures for Hardware Inventory and Control

Check classification of hardware Maintain access control lists and inventories for hardware Follow local SOP

Procedures for Software Inventory and Control

Check classification of software and systems Maintain access control lists and inventories for software Follow local SOP

CAS

Collaboration at Sea Web based system used to convey mission essential information to a large group of users with low band-width consumption. (CASREPS)

CANES

Consolidated Afloat Networks Enterprise Services (CANES) · The enhancement of the requirements for five existing legacy network programs, as well as a single support framework for all C4I applications that currently require dedicated infrastructure to operate delivered and managed legacy systems. These include: · Integrated Shipboard Network System (ISNS) · Sensitive Compartmented Information (SCI) Networks · (CENTRIXS-M)

Importance of 3M for Information Systems

Continuity of operations is ensured through proper maintenance Maintenance is integral to operational success Scheduled maintenance must be done in accordance with ship's schedule to mitigate any issues from down systems.

Active Directory

Created by Microsoft for Windows domain networks. Acts as the central location for network administration and security.

Overhead

Data that is not part of the user data, but is stored or transmitted with it. Overhead can be used for a wide variety of purposes, such as circuit monitoring, channel separation, addressing, error control, priority indication, and congestion management. Overhead results in an excess or increase of computation time, memory resource utilization, or bandwidth requirements

SharePoint/portals

Designed as a broad, central application platform for common enterprise web requirements. Used for the management and collaboration of resources.

Explain your command's procedures and policies for set-up and activation of a VTC:

Discuss - Local Standard Operating Procedures (SOP) Best Practices: - Start and End on time - Ensure setup of equipment is pre-configured and tested - Ensure the correct audience is in attendance - Ensure enough time is given for the subject - Pre-deliver slides or materials in case bandwidth is not available to display them

DNS

Domain Name System Protocol that translates plain language domain names into IP addresses for routing and access.

DHCP

Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for hosts on Internet Protocol (IP) networks. Automatically provides client computers and other TCP/IP-based network devices on an information system with valid IP addresses for Internet connectivity to various websites and programs. Note: Static IPs should be used for servers, printers, CO & XO computers.

NGEN

Evolution of the NMCI program; follow-on acquisition approach to providing enterprise network services that were originally consolidated in 2000 under the NMCI contract.

FFT

Fast File Transfer Transfer of files and shared documents over the network at increased speeds due to multicasting several document parts at once.

Describe the different types of VTC connections:

IP - Internet Protocol (IP) is a digital network through which IP packets are forwarded to an intended destination IP address. This technology has been available to VTC since the 1990s, and due to more efficient video compression technologies, it is now possible to communicate via video through desktop or PC based applications. ISDN [ref. a, ch 2.7.5] - Integrated Services Digital Network (ISDN) has a non-fluctuating bandwidth of 128 Kbps. ISDN communications typically occur through a phone line. This technology is useful as a backup to IP communications or as a primary form to remote locations which may not have broadband connection services. Bridge/Hub Bridge - Bridges typically are used to join two otherwise separate computer networks together to enable communication between them and great a Local Area Network (LAN) and support wireless access points. For VTC purposes, a Multipoint Conferencing Unit (MCU) is used. Hub - A hub is a small, simple, inexpensive electronic device that joins multiple computers together creating a network segment. On this segment, all computers can communicate directly with each other.

Throughput

In general terms, throughput is the rate of production or the rate at which something can be processed. When used in the context of communication networks, such as Ethernet or packet radio, throughput or network throughput is the rate of successful message delivery over a communication channel

Rules for Software Licenses

Individual- The software may only be installed and used by a single user. Sharing of the software is illegal. Enterprise- Two or more users may use the software. Management and administration of software for multiple users is authorized in accordance with number of licensures purchased.

JIE

Joint Information Environment DOD effort to consolidate and standardize Department of Defense and military-service information-technology (IT) and networks.

Latency

Latency is a consequence of the limited velocity with which any physical interaction can propagate. In communications, the lower limit of latency is determined by the medium being used for communications. In reliable two-way communication systems, latency limits the maximum rate that information can be transmitted, as there is often a limit on the amount of information that is "in- flight" at any one moment.

Windows

Microsoft

ONENET

OCONUS Navy Enterprise NetworkDoN Program to deliver telecommunication services to OCONUS Navy shore commands by using a common computing environment for both NIPR and SIPR.

Define the Purpose of SPAWAR Acquisition Integrated Logistics Online Repository (SAILOR) 2.1

Program to assist the fleet in accessing current hardware and software configurations as well as product support documents. SAILOR allows the fleet to exchange technical knowledge with subject matter experts through blogs and a technical exchange forum which ultimately increases transparency and decreases response time.

Lightweight Directory Access Protocol (LDAP)

Protocol for accessing and maintaining distributed directory information services over a network. Port 389.

Firewalls

Provides security on a network by filtering traffic through ports and protocols. Configuration dictates use and purpose.

DOD VIDEO TELECONFERENCING SERVICE (VTC)

Quality VTC communications requires much higher bandwidth than voice or traditional data communications. The actual bandwidth required is dependent upon the CODEC and compression algorithm used. The typical minimum bandwidth requires is 128Kbps with 384Kbps being typical and required for quality video. Some CODECs require as much as 2Mbps in support of high definition video. • The telecommunications network used for VTC connectivity is a traditional circuit switched telephony network such as the Defense Switched Network (DSN) and/or Public Switched Telephone Network (PSTN). • The DSN is the preferred network for DoD VTC connectivity. Both of these networks are based in TDM technologies and typically provide Integrated Services Digital Network (ISDN) lines for access to the network. Both Basic Rate interface (BRI) and Primary Rate interface (PRI) ISDN lines are used. Addressability is handled as with any other telephone instrument, the address is the phone number associated with the line from the circuit switch to the instrument.

RAID

Redundant Arrays of Inexpensive Disks · The configuring of multiple hard drives to store data to increase logical volume size, improve performance, or ensure that if one hard drive fails, the data is still available from another hard drive.

SFTP

Secure File Transfer Protocol (also known as FTP over SSH) · Network protocol that provides file access, file transfer, and file management over any reliable data stream. · Client-Server Based · Port 22 (Can be configured on any port) · Secure

Define the Following Common Network Devices

Servers (Web, Mail, Domain, etc.) - Provides central connectivity and storage of information on a network. Configuration dictates use and purpose.

Define the Purpose of the Navy Consolidated Help Desk (Navy 311)

Single point of customer service entry into the shore infrastructure and network of Fleet support providers. Help Desk covers systems and equipment, QoL, Personnel, Supply and Logistics, and Facilities.

Host Based Security System (HBSS)

Suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems.

Define commonly used bandwidth increments from 5kbps to OC192

T1 - 1.544 Mbps T3 - 44.736 Mbps OC1 - 51.48 Mbps OC3 - 155.52 Mbps OC12 - 622.08 Mbps OC48 - 2.4 Gbps OC192 - 9.6 Gbps

E1

Ten years following the success of the T1, Europe decided they wanted their own digital transmission technology and subsequently developed the E1. An E1 connection supports 2.048Mbps. The E1 and T1 can be interconnected for international use. Europe has E carrier ratings from E1 to E5 with E5 supporting 565.148Mbps

Bandwidth

The amount of data that can be transmitted in a fixed amount of time. For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second. For analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz).

UNIX

UNIX/LINUX/Red Hat

x.400

Used for E-mail (Microsoft Exchange Server)

X.500

Used for electronic directory services (Directory Access Protocol)

Workstations

User interface with the information system and connection to information stored on servers.

DOD VIDEO TELECONFERENCING SERVICE (VTC)

VTC is an extension of traditional telephony technologies with the added feature of being able to see the person or persons with whom one is talking. Another way to consider VTC technology is an extension or combination of television, which provides the audio and video communication aspect, and telephony or telecommunications which provides the addressable, bi-directional connectivity. The results of which are a bi-directional, "closed circuit", dial-able, TV system. The television portion of the technology uses video display screens (televisions/video monitors/projectors), video cameras, microphones, and speakers at each location connected to a Coder-Decoder (CODEC). The CODEC is the interface between the analog voice/video devices in the system and the addressable connectivity or transmission portion of the system. The CODEC converts the analog signals to digital format that is compatible with the transmission media. The CODEC also interfaces and converts presentation and whiteboard information. The combined digital signal is then transmitted to the remote location via a telecommunications network which is either TDM or IP based

Vulnerability Remediation Asset Manager (VRAM)

Vulnerability Remediation Asset Manager (VRAM) - Provides information and guidance on patches and changes to the system to address vulnerabilities

Define and Give Examples of Relational Databases

· A relational database allows you to easily find specific information. · Uses tables for organization · Examples: NCTSS, EHF User Segments via MILSTAR, and DMS

Explain the Importance of Network Back-ups and Frequency of Back-ups

· Back-ups provide continuity of service/information in case of system failure · Incremental backups are performed nightly in accordance with CC01 43P1 · Full backups are performed weekly in accordance with CC01 43P1

Virtual Private Network (VPN)

· Capability- A method employing encryption to provide secure access to a remote computer over the Internet. · Vulnerability- Interoperability of network devices and the use of wireless devices can render the encryption useless at access points.

· Outlook Web Access (OWA)

· Capability- Remote access to Microsoft Outlook · Vulnerability- Remote user attacks; false authentication/stolen credentials

UNIX file share

· File Transfer and sharing protocol in UNIX. Can also be done remotely when configured properly.

Procedures for Performing database Back-ups and Restoral

· Follow Local SOP · Back-up required information to tape · Verify back-up with time stamp · If restoral from back-up is required verify with N6 on most current back-up and document any information that will be missing.

Define Common UNIX Variants

· LINUX · Apple OS X · LynxOS · NetBSD · OpenLinux

FTP

· Network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. · Client-Server Based · Port 20/21 · Unsecure

Identify Remote Management Software and its use in Software Distribution on a Network

· Remote management software and software distribution on a military network is controlled by DISA and the DoN CIO. · Any software changes or configurations must be approved and within baseline for the system in question. · Remote servers for the dissemination of information are commonly used, most notably Navy Information Application Product Suite (NIAPS). · NIAPS delivers maintenance, logistics, administrative, training and management applications to users at sea.

NMCI

· Shore-based enterprise network in the continental United States and Hawaii, providing a single integrated, secure information technology (IT) environment for reliable, stable information transfer. · Represents 70% of all DoN IT · Second in size only to the Internet

Describe the Process for Database Sharing and Replication

· Various data owners must provide up-to-date changes to any information · These changes can be done by a complete data load or incrementally from the last update · Data warehousing provides a large area for data to be shared to a large user base


Kaugnay na mga set ng pag-aaral

TOPIC 1: Central Problem of Economics

View Set

6 FACTORS THAT MAY SHIFT THE SUPPLY CURVE

View Set