SlideShare a Scribd company logo
1 of 32
SECTION 108 NETWORKS
108.1 Define the following devices and their uses:  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
108.1 Define the following devices and their uses: (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object]
108.2 Define the following layers of routing and common devices associated with each: ,[object Object],[object Object],[object Object]
[object Object]
[object Object]
[object Object]
[object Object],[object Object]
[object Object]
 
[object Object]
d. WAN – Wide Area Network
e. Metropolitan Area Network  - is a large computer network that usually spans a city or a large campus. A MAN usually interconnects a number of local area networks (LANs) using a high-capacity backbone  technology, such as fiber-optical links, and provides up-link services to wide area networks and the Internet.
f. Global Access Network   - is a telecommunication system that extends mobile voice, data and IP Multimedia Subsystem/Session Initiation Protocol (IMS/SIP) applications over IP networks. Unlicensed Mobile Access or UMA, is the commercial name used by mobile carriers for external IP access into their core networks.
108.4 Identify the functions, by layer, of the following models:
108.5 State the difference between IPv4 and IPv6. IPV4 HAS 32 BIT ADDRESSES IPV6 HAS 64 BIT ADDRESSES
108.6 Define the following and how they are used: ,[object Object]
108.6 Define the following and how they are used: (cont) ,[object Object]
108.6 Define the following and how they are used: (cont) ,[object Object]
[object Object]
a. DODN GIG  – the global information grid is a globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel.
b. Defense Information System Network  (DISN) is the United States Department of Defense's enterprise network for providing data, video and voice services. In September 1991, OSD directed DISA to implement the DISN
c. Navy/Marine Corps Intranet (NMCI)  is a United States Department of the Navy outsourcing program, in which an outside contractor provides a vast majority of information technology services for the entire Department, including the United States Navy and Marine Corps. The major US-CONUS shore based Navy network.
d. ONE-NET  is a Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations. It is based on the Navy-Marine Corps Intranet (NMCI) architecture and is designed to be interoperable with IT-21, NMCI, and the Global Information Grid in the near future.
e. IT-21 Network  – The IT-21 network is a system built to industry standards, using commercial off-the-shelf technology (or COTS), devoid of stovepipes, in a client-server environment. The goal of IT-21 is to link all U.S. forces and eventually our allies together in a network that enables voice, video and data transmissions from a single desktop PC, allowing warfighters to exchange information that is classified or unclassified, and tactical or non-tactical. The IT-21 network is a GAN, and is managed by 4 Fleet NOCs positioned around the world for 24/7 operations.
108.8 Describe the following: ,[object Object],[object Object],[object Object],[object Object],[object Object]
108.9 Describe the following to include the risks associated: ,[object Object],[object Object],[object Object],[object Object],[object Object]
108.10 Describe function and risk associated with following activities: ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],108.10 Describe function and risk associated with following activities: (cont)
108.11 Describe the functionality of PKI. ,[object Object]
PKI PROCESS FLOW CHART
108.12 State the purpose of DNS. ,[object Object]

More Related Content

What's hot

A Presentation About U.S. Hypersonic Weapons and Alternatives
A Presentation About U.S. Hypersonic Weapons and AlternativesA Presentation About U.S. Hypersonic Weapons and Alternatives
A Presentation About U.S. Hypersonic Weapons and AlternativesCongressional Budget Office
 
Eidws 114 metoc
Eidws 114 metocEidws 114 metoc
Eidws 114 metocIT2Alcorn
 
ADS-B: A pilot's guide to understanding the system and avionics
ADS-B: A pilot's guide to understanding the system and avionicsADS-B: A pilot's guide to understanding the system and avionics
ADS-B: A pilot's guide to understanding the system and avionicsSporty's Pilot Shop
 
Light Infantry Resupply Transformation v3.0
Light Infantry Resupply Transformation v3.0Light Infantry Resupply Transformation v3.0
Light Infantry Resupply Transformation v3.01st_TSG_Airborne
 
Jack Rowley on USV Technologies
Jack Rowley on USV TechnologiesJack Rowley on USV Technologies
Jack Rowley on USV TechnologiesICSA, LLC
 
F22 analysis
F22 analysisF22 analysis
F22 analysisPicard578
 
USMC Aviation Plan 2016
USMC Aviation Plan 2016USMC Aviation Plan 2016
USMC Aviation Plan 2016ICSA, LLC
 
Convoy leader-training-handbook
Convoy leader-training-handbookConvoy leader-training-handbook
Convoy leader-training-handbookzaffar abbasi
 
The Australian Navy and Integrated Force Design
The Australian Navy and Integrated Force DesignThe Australian Navy and Integrated Force Design
The Australian Navy and Integrated Force DesignICSA, LLC
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionD.A. Mohan
 
Combat leaders guide 2003
Combat leaders guide 2003Combat leaders guide 2003
Combat leaders guide 2003JA Larson
 
Air Force Association - F-22 Versus F-35 Comparison
Air Force Association - F-22 Versus F-35 ComparisonAir Force Association - F-22 Versus F-35 Comparison
Air Force Association - F-22 Versus F-35 ComparisonTommy Toy
 
Stevenson f 22 brief
Stevenson f 22 briefStevenson f 22 brief
Stevenson f 22 briefPicard578
 
Combat load report
Combat load reportCombat load report
Combat load reportJA Larson
 
Overview Of Unmanned Aircraft Systems (UAS)
Overview Of Unmanned Aircraft Systems (UAS)Overview Of Unmanned Aircraft Systems (UAS)
Overview Of Unmanned Aircraft Systems (UAS)Mark Lewellen
 
Almanaque do Curso Expedito de Operações no Pantanal (C-Exp-OPant)
Almanaque do Curso Expedito de Operações no Pantanal (C-Exp-OPant)Almanaque do Curso Expedito de Operações no Pantanal (C-Exp-OPant)
Almanaque do Curso Expedito de Operações no Pantanal (C-Exp-OPant)Falcão Brasil
 
Silent Eagle Media Brief.Doc
Silent Eagle Media Brief.DocSilent Eagle Media Brief.Doc
Silent Eagle Media Brief.DocStephen Trimble
 

What's hot (20)

A Presentation About U.S. Hypersonic Weapons and Alternatives
A Presentation About U.S. Hypersonic Weapons and AlternativesA Presentation About U.S. Hypersonic Weapons and Alternatives
A Presentation About U.S. Hypersonic Weapons and Alternatives
 
Eidws 114 metoc
Eidws 114 metocEidws 114 metoc
Eidws 114 metoc
 
80920328 vdr
80920328 vdr80920328 vdr
80920328 vdr
 
ADS-B: A pilot's guide to understanding the system and avionics
ADS-B: A pilot's guide to understanding the system and avionicsADS-B: A pilot's guide to understanding the system and avionics
ADS-B: A pilot's guide to understanding the system and avionics
 
Light Infantry Resupply Transformation v3.0
Light Infantry Resupply Transformation v3.0Light Infantry Resupply Transformation v3.0
Light Infantry Resupply Transformation v3.0
 
Jack Rowley on USV Technologies
Jack Rowley on USV TechnologiesJack Rowley on USV Technologies
Jack Rowley on USV Technologies
 
Mdmp Bctp.2
Mdmp Bctp.2Mdmp Bctp.2
Mdmp Bctp.2
 
F22 analysis
F22 analysisF22 analysis
F22 analysis
 
F 35 Production
F 35 ProductionF 35 Production
F 35 Production
 
USMC Aviation Plan 2016
USMC Aviation Plan 2016USMC Aviation Plan 2016
USMC Aviation Plan 2016
 
Convoy leader-training-handbook
Convoy leader-training-handbookConvoy leader-training-handbook
Convoy leader-training-handbook
 
The Australian Navy and Integrated Force Design
The Australian Navy and Integrated Force DesignThe Australian Navy and Integrated Force Design
The Australian Navy and Integrated Force Design
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An Introduction
 
Combat leaders guide 2003
Combat leaders guide 2003Combat leaders guide 2003
Combat leaders guide 2003
 
Air Force Association - F-22 Versus F-35 Comparison
Air Force Association - F-22 Versus F-35 ComparisonAir Force Association - F-22 Versus F-35 Comparison
Air Force Association - F-22 Versus F-35 Comparison
 
Stevenson f 22 brief
Stevenson f 22 briefStevenson f 22 brief
Stevenson f 22 brief
 
Combat load report
Combat load reportCombat load report
Combat load report
 
Overview Of Unmanned Aircraft Systems (UAS)
Overview Of Unmanned Aircraft Systems (UAS)Overview Of Unmanned Aircraft Systems (UAS)
Overview Of Unmanned Aircraft Systems (UAS)
 
Almanaque do Curso Expedito de Operações no Pantanal (C-Exp-OPant)
Almanaque do Curso Expedito de Operações no Pantanal (C-Exp-OPant)Almanaque do Curso Expedito de Operações no Pantanal (C-Exp-OPant)
Almanaque do Curso Expedito de Operações no Pantanal (C-Exp-OPant)
 
Silent Eagle Media Brief.Doc
Silent Eagle Media Brief.DocSilent Eagle Media Brief.Doc
Silent Eagle Media Brief.Doc
 

Viewers also liked

Eidws 107 information assurance
Eidws 107 information assuranceEidws 107 information assurance
Eidws 107 information assuranceIT2Alcorn
 
Eidws 113 technical fundamentals
Eidws 113 technical fundamentalsEidws 113 technical fundamentals
Eidws 113 technical fundamentalsIT2Alcorn
 
Eidws 106 security
Eidws 106 securityEidws 106 security
Eidws 106 securityIT2Alcorn
 
Chris Alcorn Bachelor Degree (1)
Chris Alcorn Bachelor Degree (1)Chris Alcorn Bachelor Degree (1)
Chris Alcorn Bachelor Degree (1)IT2Alcorn
 
Eidws 110 operations
Eidws 110 operationsEidws 110 operations
Eidws 110 operationsIT2Alcorn
 
Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligenceIT2Alcorn
 

Viewers also liked (6)

Eidws 107 information assurance
Eidws 107 information assuranceEidws 107 information assurance
Eidws 107 information assurance
 
Eidws 113 technical fundamentals
Eidws 113 technical fundamentalsEidws 113 technical fundamentals
Eidws 113 technical fundamentals
 
Eidws 106 security
Eidws 106 securityEidws 106 security
Eidws 106 security
 
Chris Alcorn Bachelor Degree (1)
Chris Alcorn Bachelor Degree (1)Chris Alcorn Bachelor Degree (1)
Chris Alcorn Bachelor Degree (1)
 
Eidws 110 operations
Eidws 110 operationsEidws 110 operations
Eidws 110 operations
 
Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligence
 

Similar to Eidws 108 networks

2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptgauravgoswami78
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.pptrakesh132809
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptxSelfUse
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptunnipb1
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptnilesh405711
 
Class Note
Class NoteClass Note
Class NoteAK IJ
 
Network protocol
Network protocolNetwork protocol
Network protocolQadarAhmed1
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSaagar Shetage
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...sherinjoyson
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod pptDhruvilSTATUS
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptkrishna683602
 

Similar to Eidws 108 networks (20)

2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
 
Gunn 8th- Lily.pptx
Gunn 8th- Lily.pptxGunn 8th- Lily.pptx
Gunn 8th- Lily.pptx
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).ppt
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.ppt
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptx
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Class Note
Class NoteClass Note
Class Note
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Eidws 108 networks

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.  
  • 11.
  • 12. d. WAN – Wide Area Network
  • 13. e. Metropolitan Area Network - is a large computer network that usually spans a city or a large campus. A MAN usually interconnects a number of local area networks (LANs) using a high-capacity backbone technology, such as fiber-optical links, and provides up-link services to wide area networks and the Internet.
  • 14. f. Global Access Network - is a telecommunication system that extends mobile voice, data and IP Multimedia Subsystem/Session Initiation Protocol (IMS/SIP) applications over IP networks. Unlicensed Mobile Access or UMA, is the commercial name used by mobile carriers for external IP access into their core networks.
  • 15. 108.4 Identify the functions, by layer, of the following models:
  • 16. 108.5 State the difference between IPv4 and IPv6. IPV4 HAS 32 BIT ADDRESSES IPV6 HAS 64 BIT ADDRESSES
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. a. DODN GIG – the global information grid is a globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel.
  • 22. b. Defense Information System Network (DISN) is the United States Department of Defense's enterprise network for providing data, video and voice services. In September 1991, OSD directed DISA to implement the DISN
  • 23. c. Navy/Marine Corps Intranet (NMCI) is a United States Department of the Navy outsourcing program, in which an outside contractor provides a vast majority of information technology services for the entire Department, including the United States Navy and Marine Corps. The major US-CONUS shore based Navy network.
  • 24. d. ONE-NET is a Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations. It is based on the Navy-Marine Corps Intranet (NMCI) architecture and is designed to be interoperable with IT-21, NMCI, and the Global Information Grid in the near future.
  • 25. e. IT-21 Network – The IT-21 network is a system built to industry standards, using commercial off-the-shelf technology (or COTS), devoid of stovepipes, in a client-server environment. The goal of IT-21 is to link all U.S. forces and eventually our allies together in a network that enables voice, video and data transmissions from a single desktop PC, allowing warfighters to exchange information that is classified or unclassified, and tactical or non-tactical. The IT-21 network is a GAN, and is managed by 4 Fleet NOCs positioned around the world for 24/7 operations.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 32.