CDC 3D152 Flashcards
What is modulation?
Process of modifying any characteristic of a signal so that it varies in-step with value of another signal.
Analog-to-Digital Technique?
Digital-to-Analog Technique?
PCM
CVSD
What are the two basic types of modulation?
Analog & Digital
What are the three basic types of analog modulation?
AM / FM / PM
What are the three basic types of analog modulation used to convert digital signals?
ASK / FSK / PSK
What is the simplest form of PSK?
BPSK
What analog modulation technique is similar to QPSK?
QAM
Why is DPSK better than PSK?
Easier to implement / more robust
What are the 4 basic types of pulse modulation?
PAM / PDM / PPM / PCM
How does ADPCM differ from PCM?
ADPCM = 4 bits; 32K
PCM = 8 bits; 64K
How does ADM differ from DM?
Signal’s step size may vary from sample to sample
What is a simple form of ADM?
CVSD
What frequencies are present at output of AM modulator?
Carrier Frequency, Carrier + MF, Carrier - MF
MF = Modulating Frequency
What components of AM modulated sine wave carries information signals?
Upper/Lower Sidebands
What are the 2 bands of frequencies located below and above the carrier in AM modulated signals called?
Upper/Lower Sidebands
Which sideband of AM modulated signal is a mirror-image of the modulating signal?
Lower Sideband
How does the bandwidth required to transmit an AM signal compare to that for transmitting the modulating signal by itself?
Bandwidth required = 2x that of modulating signal itself.
What is the predominant characteristic of SSBSC modulation?
All of the transmitter power can be used for transmission of info signal located in one sideband w/out carrier.
What advantage does SSBSC have over other forms of AM?
6 to 1 improvement.
What makes SSBSC more efficient?
Reduced bandwidth / greater power efficiency.
In AM, what products are present in the resultant waveform?
Carrier, upper sideband, lower sideband.
What term is used for additional sidebands that cause unwanted bandwidth and distortion transmitted in AM signal?
Splatter
What problem is associated with all forms of AM?
Susceptibility to interference.
What determines amount of deviation of an FM carrier?
Amplitude of modulating signal.
How does the rate of deviation compare with the frequency of modulating signal?
Directly proportional.
What agency is responsible for determining maximum amount of deviation?
FCC
In PM, how is the transmitted signal modulated?
Carrier’s phase is caused to shift at rate of modulating signal.
What effect does a change in amplitude have on a PM signal?
Amount of phase signal is proportional to amplitude of modulating signal.
What effect does a change in frequency have on a PM signal?
Rate of phase shift is controlled by frequency of modulating frequency.
How is carrier stability maintained in a PM signal?
Crystal-controlled oscillators
In BPSK, what amount of degrees of phase shift of the carrier is used to represent binary 1’s and 0’s?
180 degrees
What are the advantages of bi-phase modulation?
Insensitivity to level variations; low frequencies/smaller bandwidth requirements.
What are the disadvantages of BPSK?
Complex, costly, phase ambiguity.
What are the main advantages of QPSK over BPSK?
Transmit 2x the amount of data
How is phase ambiguity overcome when PM techniques area used?
Use of a pilot tone
How many carrier phases does quadriphase modulation have?
4
How is information represented in DPSK?
Changes in phase value form one sample to the next.
What is the main advantage of DPSK?
Less complex receiver needed.
What are the 3 characteristics of a pulse train that can be varied by an information signal to produce a modulated rectangular pulse train?
Peak voltage, period, pulse width/duration.
What determines the bandwidth of a pulse train?
Width of pulses.
What characteristics of a pulse train does frequency influence?
Number/spacing of harmonics
What 2 modulation processes are required to transmit pulse-modulated signals?
Pulse Modulation
AM / FM
What are 5 pulse-modulation techniques that can be used to form composite TDM signals?
PAM / PDM / PPM / PCM / DM
What is the simplest analog pulse-modulation technique?
PAM
What is the PAM process?
Pulse carrier is AM-modulated to convey information
What is the sampling rate of a 4-kHz voice channel?
8 kHz
What determines the amplitude of a PAM pulse?
Amplitude of modulating signal @ point of sampling
What susceptibility does PAM share with AM?
Noise
What are 2 other names for PDM?
PWM
PLM
What determines PDM pulse width?
Amplitude of modulating signal @ point of sampling
Why is PDM less affected by noise than PAM?
Noise less likely to be correct (amplitude/time)
What disadvantage is shared by both PAM and PDM?
Proportionately affected by distortion in pulse width/amplitude.
How does PPM over disadvantage of distortion experienced in PAM and PDM?
Pulses are at constant widths and amplitudes
What is a disadvantage of PPM?
Eats up a lot of bandwidth
What determines the time position of a PPM pulse?
Amplitude of modulating signal @ time of sampling
Give 2 reasons for converting analog signals to digital signals before transmission.
Digital media can be regenerated and easily encrypted.
What is the principal advantage of converting analog signals to digital signals before transmission?
Quantizing Noise
Of PAM, PDM, PPM, PCM - which is least affected by noise?
PCM
What is the PCM process?
Analog utililizing a band-limiting filter; binary code word; modulated using AM / FM / PSK.
What is quantizing noise?
PAM pulses ‘rounded off’ to nearest assigned value.
How many code bits are required to provide 16 quantized steps?
4
Which quantizing method produces less quantizing noise?
Nonuniform quantizing
How can we increase the capability for regenerating quantized pulses?
Keeping pulses at a constant duration and amplitude`
Companding does what?
Reduces the range of voice signals; compresses high-amplitude portions.
Why is PCM less susceptible to noise than PAM or PDM?
In PCM, noise must insert or obscure pulse not just change its height or duration.
What is ADPCM different from PCM?
It generates a 4-bit word PAM rather than an 8-bit word.
Name two methods of multiplexing.
TDM
FDM
Describe the difference between the two methods of multiplexing.
TDM: Time slots
FDM: Frequency
What type of signal(s) is the T1 able to transmit?
Analog, digital, video
What are some of the advantages of T1 multiplexing?
Simplicity
What method of multiplexing does the T1 use?
TDM
WDM is considered a method of improving what?
Efficiency through fiber through condensing transmitted channels.
How does WDM work?
Uses wavelengths of light or different colors in spectrum.
What are WDM technologies?
WDM
CWDM
DWDM
What does CWDM use to reduce cost?
Uncooled lasers
What three characteristics must the DWDM optical demultiplexer have?
Stable, flat passband, must reject adjacent optical channels.
Define the term ‘bit’.
Bit of information based on 2 symbols, states or conditions.
What unit of measurement is normally used in data systems to express signaling speed for equipment?
Bits / second
What does “baud” mean?
Unit of modulation rate of the shortest unit interval.
What’s the difference between baud and bit.
Baud: Expression of time
Bit: No ‘time’ reference
What is the difference between overflow and underflow?
Overflow: More bits than expected
Underflow: Fewer bits received than expected.
What are the 3 terms we use to describe synchronization methods used in digital signaling?
Synchronous, asynchronous, isochronous
How many synchronizing pulses are needed in synchronous operation?
None
How does synchronous operation work?
Receiving device adjusts automatically to speed of transmitting; compares speed of incoming signal with time base.
What constitutes an asynchronous signal?
Any signal with synchronizing bits
What are the principles of asynchronous operation?
Start / stop bits
How does asynchronous synchronization affect transmission speed?
Slows down transmission speed
What is an isochronous signal?
All bits are equal duration
Which of the synchronization terms is normally used with channel-packing systems to indicate the utilization of internal timing?
Isochronous
Name 2 factors that determine when a digital transition should occur.
Bit rate of signal / signals format
Define NRZ-L
Level / Mark-Space
What is a BPV?
Bi-polar variation; 2 consecutive marks occur with same polarity.
How does the B8ZS signal format correct ones density problems?
By intentionally inserting BPV’s into signal to break up 0’s.
Which type of framing would be used for a T1 carrying video traffic?
ESF
Which framing sequence is used for synchronization with incoming data?
D4
What are the 3 types of communcations signals that are the functions to control and process analog calls?
Control / Informational / Supervisory
What are the 2 methods of address signaling?
Pulse / Tone
Call waiting is what type of communication signal?
Information signaling
What is the purpose of supervisory signaling?
Monitor status of line to determine state
What are the 2 digital signaling methods to transmit supervisory signaling?
CAS / CCS
How does CAS signaling convey signaling information?
Bit-robbing
How does CCS convey signaling information?
Uses a separate network channel to transfer supervisory information in an out-of-band fashion and multiplexed with the digitized voice signals.
What are the 3 CCS signaling modes?
Associated
Non-associated
Quasi-associated
Define noise.
Unintelligible electrical disturbances; leads to masking/distortion.
What is white noise?
Mixture of all frequencies / if loud enough can mask.
What is the usual circuit input impedence for a transmission line?
600 Ohms
What causes impulse noise?
Disturbances that have abrupt amplitudes of short duration
When is the best time to take measurements of impulse noise?
During times of peak system activity
Define the term clocking.
Rate of running / keeps approximately standard time.
What is a station clock? What can a station clock minimize?
Clock that controls some/all of the equipment. (Requires local time control)
What are 2 types of station clocks?
Master / Slave
What is the master station clock?
Cesium beam / GPS tied to primary communications equipment
How does a slave clock get its timing?
Locks onto incoming data stream from a stable source
How does synchronization distinguish positions in the data bit stream?
1’s and 0’s are transmitted / patterns of frame bits (known as framing formats)
What 3 factors can affect the line quality of a long distance transmission line?
Attenuation distortions, delays, noise
How can the capacitance of a transmission line cable be varied?
Insulation, size of wire, spacing between wires.
A reduction in energy that is generally expressed in decibels.
Attenuation
A proportionate increase that results with the length of the line.
Inductance (L) of the line
A movement through a medium; transmission
Propagation
A variance with frequency
Attentuation distortion
A means to compensate for attenuation distortions caused by transmission lines
Lumped Inductances
Define electronic attack
Electronic Warfare utilizing the electromagnetic and directed energy and anti-radiation weapons to attack personnel, facilities and equipment.
Give one example of electronic attack
High-speed anti-radiation missiles
Protecting people, facilities and equipment from electronic attack is known as…
Electronic Protection (EP)
What are two examples of EP for a radar system?
Active decoys to draw missiles off-target. Varying pulse repetition frequency.
What is ES?
Electronic Warfare Support: Putting a picture together for battle commanders; accurate picture of spectrum w/in AOR (area of responsibility).
What are two items used to provide ES capability?
Radar warning receivers / intelligence platforms.
What is the purpose of a multimeter?
Measure voltage, current and resistance.
How is a multimeter connected in a circuit to measure microamperes?
In series
How is a multimeter used as a voltmeter in a circuit/
In parallel
What preliminary precaution should you take when using an ohmmeter to take a resistance reading?
Make sure all power is off
What kind of cable faults can the TDR locate?
Splices, water in cable, split pairs, discontinuities / faults.
Describe a TDR’s operating principle.
Similar to radar where a pulse is applied; impedence changes and reflections occur.
How does cable fault information appears on the TDR’s CRT?
View CRT
Explain the purpose of the impedence selector buttons.
Input / Output: 50 / 75 / 95 / 125 Ω
Describe how you would connect a cable under test to the TDR.
Do not connect live cables
What do deflections (pips) indicate to the TDR user?
Upward deflections = Opens
Downward deflections = Shorts
Describe 2 operating modes used by the TD-9930
Real-time & Average
What are the 4 tests and measurements performed by the OTDR?
Cable acceptance testing / cable installation / end-to-end tests / fault location
What is the power that is reflected back towards the optical source?
Backscatter
How is signal loss represented in an OTDR display?
dB drop in backscatter between 2 reflections is signal loss within fiber.
What index factor is the TD-9930 already programmed to accept?
Index of 1.47
What are the 2 major sections of a BERT set that create and receive the test pattern?
Data Code Generator (Transmitter) & Code Detector (Receiver)
What type of test pattern does the data code generator produce?
Pseudo-random
Name 2 common signal codes that are used with BERT sets.
AMI / B8ZS
Name 2 framing formats used with BERT sets.
D4 / ESF
What does 63, 511 and 2047 in a test pattern identify?
Total # of bits in a pattern
Explain the purpose of a breakout box
Monitor / access all 25 conductors of RS-232 and ITU V.24 interfaces between modems and terminals.
What is the purpose of the 24 miniature ON/OFF switches on a breakout box?
Allow interface conductors (except frame ground pin 1); interrupted individually for isolated testing and observation.
What is an example of analog-to-digital and digital-to analog techniques?
Pulse code modulation (PCM) and continuously variable slope delta (CVSD) modulation.
What converts analog signal information into an analog carrier signal?
Analog modulation.
What converts analog signal information into a digital carrier signal?
Digital Modulation.
The information-carrying components that occur on either side of a carrier are called
Sidebands.
Amplitude Modulation (AM) requires a bandwidth that is
twice that of the modulating signal.
The upper sideband in a single-sideband suppressed carrier (SSBSC) modulation is eliminated by
filtering.
We can express the 6-to-1 improvement of the single-sideband suppressed carrier(SSBSC) modulation over conventional amplitude modulation (AM) as
8 dB of improvement.
The only basic waveform in nature is a
pure sine wave.
A modulated waveform that contains a carrier plus two sidebands for each modulation frequency is a description of
an amplitude modulation (AM)
If 100 percent modulation is exceeded and there is distortion in the modulating signal, additional sidebands are generated. WE identify these sidebands as what?
Splatter
The amount of deviation in a frequency modulation (FM) signal is directly proportional to the modulating signal’s
amplitude.
The amount of phase shift in a phase modulation (PM) signal is directly proportional to the modulating signal’s
amplitude of the modulating signal.
What form of modulation is insensitive to signal variations?
Binary-phase shift keying or bi-phase shift keying (BPSK)
In quadrature-phase shift keying (QPSK) the radio frequency (RF) bandwidth for a quadriphase signal is what of that required by bi-phase signal, given the same data rate.
Half.
What is the main advantage of differential phase shift keying (DPSK)?
It requires a less complex receiver than a basic phase shift keying (PSK) signal.
Which of the following is not considering an analog modulation techniques?
Pulse-code modulation (PCM)
The form of pulse modulation in which the pulse is varied within a set range of positions is known as
Pulse-duration modulation (PDM).
Quantized analog modulation is actually
analog-to-digital conversion.
How many bits per character of a 16-step pulse-code modulation (PCM) system are used to describe the quantized analog sample?
4.
The process of coding pulse code modulation (PCM) quantized pulses to make them a constant duration and amplitude is
encoding.
In Time Division Multiplexing (TDM), the transmitting multiplexer will put a bit or a byte from each of the incoming lines into a specifically allocated what?
time slot.
The two major types of frame structures are
CCITT and low speed.
Wave-division multiplexing (WDM) creates the virtual channels for multiplexing them together for transmission by using different
Wavelengths or lambdas.
The most common wave-division multiplexing (WDM) system uses how many wavelengths?
2.
The method of multiplexing the T1 multiplexer uses is
Time division.
Individual pulses within digital signal are
bits.
What unit is most commonly used in data systems to express signaling speed?
Bits per second.
Bit count integrity problems are primarily caused by
system timing faults.
Three categories of synchronization used in digital data circuits are
synchronous, asynchronous, and isochronous
Which option is a characteristic of synchronizing bits within the signal stream describes
All data bits are the same length in time.
A digital signal that contains synchronizing bits within the signal stream describes
Asynchronous operation.
In what type of signal is the information contained in the transition, and there is a transition from one state to the other only when a mark bit is sent?
Non-return-to-zero mark.
In what type of signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?
Return-to-zero.
Which statement best describes an alternate mark inversion (AMI) signal?
A logic one is transmitted as positive voltage if the previous logic one was negative.
Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to
maintain ones density standards.
Which statement best describes a binary with eight-zero substitution (B8ZS) signal?
Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.
The major difference between conditioned di-phase (CDI) and other schemes is the
use of mid-bit transitions for timing.
How many bits are in the D4 framing sequence?
12.
How many bits are in the extended superframe format (ESF) framing sequence?
24.
What communications control signal uses a two-frequency dialing combination?
Tone dialing.
What communications information signal uses a continuous 350- and 440-Hz frequency pair?
Dial tone.
What communications information signal uses a signal cycled on and off for 0.5 second and contains the generation of a 480- and 620-Hz frequency pair?
Busy signal.
What communications supervisory signal uses a continuous application of direct current voltage for signaling?
Loop-start.
When is the voltage applied in loop-start signaling?
Off-hook condition.
In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used to convey signaling information known as?
Bit robbing.
In what common channel signaling (CCS) mode are the messages relating to signaling between two points conveyed directly interconnecting these signaling points?
Associated mode.
What are the two principle weighting characteristics in use with telecommunication circuit noise?
CCIT psophometric and C-message.
While timing makes sure the equipment is sending and receiving bits at the same time intervals, synchronization makes sure that the
receive equipment can find its place in the bit stream.
What term is associated with the delay or lag introduced in the application of voltage from one section to the next?
Latency.
Attenuation distortion is caused by
differing attenuation rates for the various frequency components comprising a voice frequency transmission.
Jamming a portion of the frequency spectrum is an example of
electronic attack.
The definition of electronic attack can be found in which publication?
Air Force Doctrine Document 2-5.1.
Any actions we take to protect our forces, facilities, and equipment for electronic action that can destroy or degrade our capabilities is considered
electronic protection.
Varying the pulse repetition frequency on a radar set is an example of
electronic protection.
Electronic warfare support includes devices such as
radar warning receivers and intelligence systems.
When a multimeter has three input terminal jacks, which jack is always used?
Voltage terminal.
When using a multimeter, which mode should be used if the reading is unreadable due to fluctuations?
Display hold.
When using a multimeter, which mode should be used if the reading fluctuations and a more accurate reading is desired?
Minimum/Maximum (MIN/MAX)
When using an ohmmeter to take a resistance reading, what preliminary precaution should you take?
Disconnect the power from the circuit input terminal jack.
What principle of operation does the time domain reflectometer use to test cables?
Radar.
Which Push-buttons would you select to get 125- ohm impedance on the time domain reflectometer?
50- ohm and 75-ohm
What is the power that is reflected back to an optical source in the time domain reflectometer (TDR)?
Backscatter.
What are the two major sections of a bit error rate test (BERT) set?
Transmitter and receiver.
What type of framing format should you use to conduct a bit error rate test (BERT) on a T1 circuit configured for binary with eight-zero substitution (B8ZS) coding?
Extended superframe.
Which section of a bit error rate test (BERT) set measures the received test pattern?
Receiver.
When performing a bit error rate test (BERT), what determines the size of a test pattern segment?
The number of bits that can represent the total number of bits in the test pattern.
What type of error is the result of two successive logic one pulses of the same polarity in violation of alternate mark inversion coding rules?
Bipolar violation.
On a breakout box, how many RS-232 key interface signals can be monitored and accessed individually?
12.
The purpose of the miniature ON/OFF switches on a breakout box is to
allow the interruption of the individual interface conductors.
What is a bit?
The smallest unit of information (data) a computer can process; a “1” or a “0”
What is a code set?
Preset sequence of bits that is arranged and understood by the sender and receiver
A code set of 10 bits has how many possible combinations?
1024 possible choices
What is a byte?
A set of bits “1’s” and “0’s” of a specific length that represent a value in a computer coding scheme
Normally, how long is a byte?
8 bits long
What term is used in networking when referring to 8 bits of information?
Octet
What is the ANSI’s main focus?
ANSI focuses on standards usd by software and hardware vendors who make the products the software engineer uses
What role does EIA serve?
Enables US electronics producers to be competitive by developing technical standards, hosting tradeshows, performing market analysis and facilitating relations with the government.
What is NIST’s role?
A government organization providing servies and programs to help US industries commercialize new technologies and compete internationally.
Which organizations’ specifications are supported by ANSI?
Electronic Industries Alliance (EIA) & Telecommunications Industry Assocation (TIA)
What is the CEPT?
A European body for telecommunications policymaking and regulation
What does the ETSI do?
Develops the telecommunications standards for Europe
What is the E-carrier?
Digital telecommunications services backbone system of Europe
The IETF tracks ideas or suggestions. What are these ideas and suggestions called?
Request for Comments (RFC)
What organization assumed responsibility for the IP address space allocation?
ICANN
What are some of the Project 802 standards?
802.3 = Ethernet; 802.5 = Token Ring; 802.11 = Wireless; 802.13 = Cable TV
What organization was known as the International Telegraph and Telephone Consultative?
ITU Telecommunications Standardization Sector or ITU-T
List some X-series standards that you may encounter
X.20; X.20 bis; X.21; X.21 bis; X.25; X.400; X.500
List the V-series standards that you may encounter
V.35; V.90; V.92
What are 3 distinct specifications that the RS-232 standards meets?
(1) Type of Connector; (2) Purpose / definition of connector pins; (3) Electrical characteristics of those pins.
The RS-232-C pins can be understood by knowing how they are grouped. What are the different categories?
Data, clock, control, common, ground
What is the function of the RS-232-C data leads?
Pins that carry the data intelligence from DTE to DCE and vice versa. 2 categories: Primary / Secondary (Channels)
What is the function of the RS-232-C clock leads?
They provide “clock” or “timing” for data transmission synchronization.
What is the function of the RS-232-C control leads?
Control leads are used enable / disable data transmission and reception; they also indicate the operational status an condition of DTE / DCE
Name some control leads
RTS - Pin 4; CTS - Pin 5; DSR - Pin 6; DTR - Pin 20 and Received Line Signal Detector (Carrier Detect-CD) - Pin 8.
What is the function of the RS-232-C Protective Ground - Pin 1?
Ground connection keeps you from getting shocked when you touch the equipment
What is the function of the RS-232-C Common (Signal) Ground - Pin 7?
Establishes a common reference for all interchange circuits except Pin 1
What are the 2 categories of the OSI model can be divided into?
Application & Data Transport (Layers)
What are the 4 lower layers of the OSI model responsible for?
Defining how data is sent across the physical media, through internetwork devices, to destination computer and to the application of the destination machine
This layer’s specifications include physical addressing, sequencing of frames and flow control
Data Link (2)
This layer includes multiplexing, virtual circuit management, error checking and recovery
Transport (4)
Electrical, mechanical, procedural and functional specifications for network communications
Physical (1)
A hub operates at this layer
Physical (1)
TCP operates at this later
Transport (4)
Switches and bridges operate at this layer
Data Link (2)
This layer provides routing and related functions that enable multiple data links to be combined into an internetwork
Network (3)
This layer provides a variety of coding and conversion functions that are applied to application layer data
Presentation (6)
A router operates at this layer
Network (3)
Telnet, FTP, SMTP that exist in the TCP/IP suite operate at this layer
Application (7)
This layer establishes, manages, and terminates communication sessions between presentation layer entities
Session (5)
At this layer, common data compression and encryption schemes are used
Presentation (6)
At what layers of the OSI model do LAN protocols operate?
Network & Data Link
At what layers do WAN protocols operate?
Network, Data Link & Physical
What is the difference between routing and routed protocols?
Routing: Path determination / traffic switching
Routed: Preparing data to be placed onto network media.
In essence, routing protocols route routed protocols.
With the exception of the layers on each end, what OSI model layers does each layer communicate with?
Peer layer in other network devies and the layers directly above and below
What are the 2 forms of control information typically used to exchange communications between peer OSI layers?
Headers & Trailers
What is known as encapsulation as it relates to the OSI model?
Data portion of an information unit at a given OSI layer can potentially contain headers, trailers and data from all the higher layers.
This is an information unit whose source and destination are network-layer entities that use connectionless network service.
Datagram
This is an information unit whose source and destination are transport-layer entities.
Segment
This a generic term that refers to a variety of information units.
Data unit
This is an information unit whose source and destination are data link layer entities.
Frame
This is an information unit whose source and destination entities exist in the application layers.
Message
This is an information unit whose source and destination are network-layer entities.
Packet
The asynchronous data communications protocol data frames use what for synchronization?
Start & stop bits
What 3 elements of the message block (frame) format can be contained in each BSC transmission?
Header, text and a trailer
All BOP transmissions in a link follow the frame format. The frame consists of what fields?
Start flag field, station address field, control field, data information field, frame check sequence and close flag field
In HDLC, what is used so the receiving station can determine if the data is information or a flag indicating the end of a frame?
Bit stuffing
What network is an informal collection of government, military, commercial and educational computer networks that all interconnected and transmit information?
Internet
A LAN may serve how many users?
As few as 2-3 or as many as thousands of users
What type of network is also used as a means to interconnect several local area networks by bridging them with backbone lines?
MAN or campus network
What network provides a private tunnel through the Internet?
VPN
What are the advantages of using a peer-to-peer network?
Easy to configure, don’t require additional hardware/software, users can manage their own resources, they don’t require a network administrator and they reduce costs.
What are the disadvantages of client/server networks?
Planning, design and management are complicated. Requires dedicated staff, software/hardware are expensive.
The easiest way to break down the many protocols of the TCP/IP suite is according to where they operate within the OSI model. Each protocol in this stack operates at one of what 4 layers?
Data Link, Network, Transport or Application
The protocols at the Data Link layer define the access method for the media, the architecture, and interface with the Physical layer of the network based on what protocol standards?
Standards adopted by IEEE; Project 802 standards
What are the 4 most important TCP/IP protocols that function within the network layer?
IP, ARP, RARP, ICMP
Within IP, what are the datagram fields?
Version, IHL, DiffServ Field, Total length, Identification, Flags, Fragment offset, TTL, Protocol, header checksum, Source IP address, Destination IP address, Options, Padding and Data
What are the fields belonging to a TCP segment?
Source port, Destination port, Sequence number, ACK, TCP header length, Reserved, Flags, Sliding-window size (window), Checksum, Urgent pointer, Options, Padding and Data
What are some reasons for implementing DHCP?
To reduce the time and planning spent on IP address management, to reduce the potential for errors in assigning IP addresses, to enable users to move their workstations and printers without having to change their TCP/IP configuration, and to make IP addressing transparent for mobile users
Between what layers do the application layer protocols reside?
Between the Session and Application layer of the OSI model
What’s the difference between FTP and TFTP?
TFTP uses UDP which means it doesn’t guarantee deliverability. FTP uses TCP.
What protocol is responsible for matching a host name to an IP address?
Domain Name System (DNS)
What utility sends out ICMP requests in hopes to get an ICMP echo reply?
The ping utility
Which IP address is a 32-bit number, usually represented as a four-part decimal number, with each of the four parts separated by a period or decimal point?
IPv4
IP addresses with a first octet from 192 - 223 are what of what IPv4 class?
C
What 2 questions must you ask yourself during the selection of a subnet mask?
Question 1: How many routed subnets are required?
Question 2: What is the likely maximum # of hosts on any one of those subnets?
Nowadays, what protocol is likely employed for subnetting large networks?
A protocol supporting VLSM (Variable length subnet masking)
What type of routing protocols support VLSM?
Classless routing protocols
What are some examples of classless routing protocols?
OSPF, RIP version 2, Cisco’s EIGRP / BGP / IS - IS
How many bits are in an IPv6 address?
128
How many sets of 16 bit sections make up an IPv6 address?
8
What unique part of a network device is used when acquiring an IPv6 address by way of autoconfiguration?
MAC Address
What does it mean to have a dual-stack router?
Router has both IPv4 and IPv6 protocols running on it
What IPv4 protocol is needed to tunnel IPv6?
Protocol 41
What are the two IPv6 tunneling classes?
Manual & Automatic
Which IPv6 transition approach doesn’t require a dual stack router?
NAT-PT (Network Address Translation-Protocol Translation)
Transceivers are capable of operating in what modes?
Full-duplex, half-duplex, simplex mode(s)
At what layer of the OSI model do transceivers operate and how are they used?
Physical Layer (Used in ethernet networks to connect a device to fiber or copper)
What device can be viewed as the actual interface between workstations, servers, clients and the shared media of the network?
NIC
Nearly all NIC’s contain what device that transmits and receives data signals?
Data transceiver
How do one-way repeaters overcome attenuation?
Repeaters remove the unwanted noise in an incoming signal
What do all devices on a network share when connected to a hub?
They share the same amount of bandwidth and the same collision domain
What are the 3 central hub classifications?
Passive, Active & Intelligent
What are some advantages of switches?
Internal processor, operating system, memory and ports that enable connections. Have multiple ports, make better use of limited bandwidth. More cost-efficient than bridges. Each device on switch receives its own dedicated channel. Limits potential for collisions.
What are some disadvantages of switches?
They can become overwhelmed by continuous, heavy traffic.
Why would you replace a backbone router with a switch?
A switch provides at least 2 advantages: Better security & performance
What are the 4 types of switching devices?
Cut-through / Store & Forward / Hybrid / Fragment-free
Hybrid switches represent a combination of what switching devices?
Cut-through / Store & Forward
What is a major advantage of a hybrid switch?
Its minimal latency when error rates are low and it becomes a store & forward when error rates rise, allowing it to discard frames when error rates get high
Routers operate at what layer of the OSI model?
Network (3)
What does a typical router contain?
Processor, memory, input / output, management console interface
What tasks can all routers do?
Connect dissimilar networks; interpret Layer 3 addressing; determine best path for data; reroute traffic if primary path is down
Identify and define the 4 common routing protocols
RIP: Slower, less secure. Internal protocol. Does not work well in large environments.
OSPF: Used commonly on LANs with rely on a mix of routers from different manufacturers.
EIGRP: Cisco proprietary. Supports large / heterogeneous networks.
BGP: Used on border / exterior routers.
What is a brouter?
Cross / hybrid between a bridge and a router
Where can a gateway reside?
On servers, microcomputers or on connectivity devices such as routers or mainframes
What are some popular types of gateways?
Email gateway, IBM host, Internet, LAN, Voice / Data, Firewall
What do VPN concentrators create to extend a network?
Create tunnels using secure communications across a network such as the Internet
What functions does a VPN concentrator perform?
Establish tunnels, negotiates tunnel parameters, authenticates users, assigns user addresses, encrypts and decrypts data, manages security keys, manages data transfer across the tunnel, manages data transfer inbound and outbound as a tunnel endpoint or router - invokes various standard protocols to accomplish these functions.
What is the purpose of the TDR?
It uses pulses to locate and test for sheath faults, damaged conductors, loose connectors, splices, bridge taps, split pairs and other problems.
What type of cable discrepencies can be detected by a TDR?
Opens, shorts and pin holes in cable shielding, kinks and mismatched / corroded cable connectors.
How does the OTDR use “backscattered” light to make measurements?
It correlates the returned light pulses with a location in the fiber.
What determines the amount of light-pulse power that is transmitted down the cable?
Light-pulse width
What function of the cable scanner shows the manner in which each wire is mated to the connectors at both ends of the cable?
The wire map
What are the primary capabilities provided by a protocol analyzer?
Digital network diagnostics & software development
Explain the difference between a protocol analyzer NIC and other NIC’s.
NIC in protocol analyzer: Configured to process all frames.
Other NIC’s: Only process broadcast frames and frames with its MAC address.
What function of the protocol analyzer excludes specific types of frames?
Capture filters
List 4 types of specific occurrences that can be displayed by counters.
Packets transmitted, CRC errors, undersize packets, oversize packets, ARP requests, collisions and bit errors.
What menu is best used to report errors that occur at the physical layer such as bad FCS, short frames and jabbers?
MAC node statistics
What kind of information does the connection statistics menu provide?
Bandwidth utilization and # of connections related to specific nodes.
Identify the 3 types of active tests that are conducted with a protocol analyzer.
Ping, trace route & traffic generator
MIB’s contain a set of managed objects - how are they identified?
Object identifiers
What 2 things may an MIB be indentified by?
Object name or object descriptor
What TCP / IP ports are used by SNMP?
TCP Ports 161 / 162
What are the 4 basic SNMP commands?
Read, write, trap and traversal operations
Includes authentication, access control, data confidentiality, data integrity and nonrepudiation.
Security Management
Measures network utilization of individual users.
Accounting Management
Reports the occurrence of faults and corrects them automatically.
Fault Management
Provides the capability to initialize and shut down managed devices.
Configuration Management
Ensures a transferred message has been sent and received by the parties claiming to have sent and received the message.
Security Management
It covers areas such as installation, device booting / startup, inventory management and recovery.
Configuration Management
Provides statistical data about the network.
Performance Management
How does the NMS notify you of the occurrence of a trigger event or alarm?
Change in color of a device or link on the network map that is displayed on the NNM’s monitor screen.
What must be done to each managed device on the network so that it provides data to the NNM?
Each managed device on the network must be individually configured for SNMP.
Which NNM menu includes the SNMP MIB browser selection?
The Tools menu from any network map
Which NNM submenu do you use to start the data collection process?
The NNM’s Data Collection and Threshold submenu
Which NNM submenu do you use to change alarm thresholds?
The NNM’s Data Collection and Threshold submenu
Using the NNM, what are the steps involved in printing performance graphs?
Performance graphs can be printed by selecting File & Print from the Graph window.
Name and describe the 4 types of reports that can be created using the report templates.
(1) Availability Report: % availability of network interfaces
(2) Exception Report: Threshold events that have been exceeded.
(3) Inventory Report: Lists all nodes in MIB.
(4) Performance Report: Summary of statistical data for network interfaces.
When configuring a report, what data intervals can you select?
Data collection intervals are selected in 5, 10 or 15 minute intervals.
What is the name of the Air Force initiative that defines and drives network information security?
Barrier Reef
What is the basic stance of the network security policy?
To allow authorized traffic and deny all else
What does the classic “Defense in Depth” approach to security require you to do?
Minimize exposure of your protective assets as much as possible
What service is essential to network security and must not be susceptible to spoofing?
Network time sourcing
What is the most common form of a proxy for common services?
A Firewall
What is an adverse event that threatens some element of computer security such as loss of data?
Computer security incident
What results from a denial of service security incident?
System is disabled or a worm has saturated network bandwidth
What is used to protect and measure the security posture of information systems?
Information protection tools
What is one of the primary functions of the NCC and what are the purposes of that function?
System monitoring: Verifies system is operational and makes sure that the system is being operated within parameters established by network security policy and the DAA.
What is internal control?
Defines the various mechanisms employed to provide internal system security. They may include but are not limited to: access control methods, system ID and authentication programs and system configuration.
What 2 possible security postures are used based on the information you want to protect, system usability, and the cost of required security measures?
“Default deny” posture and “Open” Posture
Information security-related access controls fall into what 2 categories?
Technical Controls: Passwords / encryption
Administrative Controls: Segregation of duties / Security screening of users.
What are one-time passwords?
Passwords used only once and change for each user access session.
What does Biometrics refer to?
ID process that uses physical / behavioral characteristics unique to the user. (Fingerprints, key-stroke patterns, voice / iris / retina, facial characteristics)
What agency approves high-robustness encryption?
NSA
What must be employed to preclude unauthorized use of legitimate identification and authentication data?
Network anti-spoofing capability
How is an IDS used in relation to a firewall?
Complements a firewall and provides additional protection, particularly against threats originating from outside the firewall.
What are some examples of an intrusion a firewall might miss but IDS might catch?
Tunneling or application-based attacks.
What happens when more bits are added to a digital signal arranged in a sequence understood by the sender and receiver?
A code set is established.
How many possible symbols can 4 bits represent?
16
In networking, a byte is identified as a/an
octet
What organization sets important computer networking wiring standards for residential and commercial network cabling?
Electronic Industries Alliance (EIA)
Which of following is an International Telecommunication Union (ITU) standardized format used for digital telecommunications services backbone system?
E-carrier.
What Electronic Industries Alliance (EIA)/Telecommunications Industry Association (TIA) standard is used for commercially building telecommunications cabling?
568A.
There is a worldwide nonprofit association of technical professionals that promotes the development of standards called the
Institute of Electrical and Electronics Engineers (IEEE)
A collection of standards for local area network (LAN) architectures, protocols, and technologies called Project 802 were developed by the
Institute of Electrical and Electronics Engineers (IEEE)
The “parent” organization, headquartered in Geneva, Switzerland, for all other telecommunications organizations is the
International Telecommunications Union (ITU)
What organization is responsible for the X-series and V-series standards?
International Telecommunication Union Telecommunications Standardization Sector (ITU-T)
Which series of standards are recommended for data transmission using the telephone network?
V.
The definition of the Open System Interconnect (OSI) reference model was a major contribution to networking made by the
International Organization for Standardization (ISO)
Within how many feet of the data communications equipment (DCE) connection does the Electronics Industries Alliance (EIA) RS-232-C standard prescribes bipolar-voltage serial data transmission?
50.
Which Electronics Industries Alliance (EIA) interface standard has the ability to work in either balance or unbalanced electrical circuits?
RS-530.
What transmission rate does Electronic Industries Alliance (EIA) RS-530 accommodate?
20Kbps to 2Mbps
What two sublayers did the Institute of Electrical and Electronics Engineers (IEEE) divide the Open System Interconnect (OSI) data link layers into?
Logical Link Control (LLC) and Media Access Control (MAC)
What Open System Interconnect (OSI) layer are common data compression and encryption schemes used?
Presentation.
What Open System Interconnect (OSI) layer is closest to the end user?
Application.
In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?
Lowest layer.
Which information unit, whose source and destination are network-layer entities, uses connectionless network service?
Datagram.
What data communication protocol is used to govern the flow and format of information between systems?
Character-oriented.
In binary-synchronous protocol, what character is used to establish and maintain character synchronization prior to the message block and during transmission?
SYN.
What data communication protocol is based on bits and the position of the bits?
Bit-oriented.
What data communication protocol ensures that the receiving station can distinguish information from garbage?
High-Level Data Link Control (HDLC)
A group of computers and associated devices that share a common communications line within a small geographic area is a
Local area network (LAN)
The interconnection of several networks in a city into a single layer network is a
Metropolitan area network (MAN)
What type of network connects networks that are typically separated by geographical distances?
Wide area network (WAN)
What type of network enables a group of two or more computer systems to communicate over the public Internet?
Virtual private network (VPN)
Which type network enables users to share resources, files, and printers in a decentralized way?
Peer-to-peer.
What network layer protocol provides information about how and where data should be delivered, including the data’s source and destination address?
Internet Protocol (IP).
Which network layer protocol matches a known internet protocol (IP) address for a destination devices to a Media Access Control (MAC) address?
Address Resolution Protocol (ARP).
Which network layer protocol provides the internet protocol (IP) address for a device that knows its own Media Access Control (MAC) address?
Reverse Address Resolution Protocol (RARP).
Which Transport Layer protocol does not guarantee that packets will be received at all?
User Datagram Protocol (UDP).
Which Application layer protocol is used to send and receive file by way of transmission control protocol/internet protocol (TCP/IP)?
File Transfer Protocol (FTP).
Which protocol is simpler than File Transfer Protocol (FTP) when transferring files between computers?
Trivial File Transfer Protocol (TFTP).
Which Application layer protocol is a terminal emulation used to log on to remote hosts?
Teletype Network.
Which Application Layer protocol is an automated means of assigning a unique internet protocol (IP) address to every device on a network?
Dynamic Host Configuration (DHCP).
Which Application layer protocol is a utility that can verify that transmission control protocol/internet protocol (TCP/IP) is installed and communicating with the network?
Ping.
The physical address of any device on the network is a/an
Media Access Control (MAC) address
What are the two parts to an Internet Protocol version 4 (IPv4) address?
Network and Host.
What is used on a transmission control protocol/internet protocol (TCP/IP) network to determine which network a computer is on?
Subnet mask.
How many subnet bits are required to support 90 subnets on a Class B network?
Seven.
How many bits are available for host bits on a Class B network using seven bits?
Nine.
What is not a recommendation for planning networks using variable length subnet masking (VLSM)?
Re-address the entire network.
What mechanism allows for easier Internet protocol version 6 (IPv6) address allocations?
Auto configuration.
Which one of the following is not an Internet protocol version 6 (IPv6) transition approach.
Auto configuration.
Which Internet protocol version 6 (IPv6) tunneling approach attempts to solve the issue of IPv6 to IP version 4(IPv4), IP protocol 41 issue?
Teredo.
Teredo has four tunneling components. Which one is not one of them?
Teredo agent.
The combination transmitter/receiver device, in a single package, is called a
transceiver.
What device provides the physical, electrical, and electronic connections to the network media?
Network interface card (NIC).
What layers of the open system interconnection (OSI) model do network interface cards (NIC) belong?
Physical and Data Link layers.
A repeater with more than one output port is a
hub.
What can be used to extend the size of a network?
Active hubs.
What device subdivides a network into smaller logical pieces, or segments?
Switch.
The time it takes a switch to figure out where to forward a data unit is called
latency.
Which device has multiport connectivity that directs data between nodes on a network?
Router.
A router’s strength is its
intelligence.
What is the oldest routing protocol?
Routing Information Protocol (RIP).
Which routing protocol does internet backbones use?
Border Gateway Protocol (BGP).
What type of gateway can restrict the kind of access local area network (LAN) users have to the internet, and vice versa?
Voice/data.
What type of gateway might include remote access servers that allow dial-up connectivity to a local area network (LAN)?
LAN.
Virtual private networks (VPN) allow the AF to extend network resources across a/an
public network.
Which of the following is not a function that a virtual private network (VPN) concentrator performs?
Encapsulates data.
What cable discrepancies can a time-domain reflectometer (TDR) detect?
Kinks, opens, and corroded connectors.
What type of cable property change does a time-domain reflectometer (TDR) detect to identify problems?
Impedance.
When using optical time-domain reflectometer (OTDR), what action is suggested by most manufacturers to prevent false readings?
Connect a launch cable between the test set and the cable being tested.
A cable wire scanner wire-map display identifies crossover and straight-through cables by
providing wiring maps at both ends of the cable.
What test equipment has the capability of diagnosing digital network and developing communications software?
Protocol analyzer.
Which component of a protocol analyzer discards frames based on its definition or activates
Filter.
What component of a protocol analyzer processes the frames based on the selected test and the user configuration inputs?
Central processing unit (CPU).
What protocol analyzer feature automatically runs in the background when the protocol analyzer application is activated?
Node discovery.
What protocol analyzer utility is used to determine if a network node is connected or responding?
Ping.
What protocol analyzer utility is used to see the path that packets are traveling and the time it takes the packets to complete the trip?
Trace Route.
A Management Information Base (MIB) can be identified by either its object name r its object what?
Descriptor.
Simple Network Management Protocol (SNMP) has three components: a managed device, an agent and a
Network Management System (NMS).
Which of the following is not a basic Simple Management Protocol (SNMP) command?
Get.
Which network management function provides the capability to initialize, operate and shut down managed devices?
Configuration.
Which network management function obtains the utilization and error rates of network devices and provides statistical data about the network?
Performance.
The community name that is used with the network management systems (NMS) authenticates
simple network management protocol (SNMP) requests.
What defines the format and type of data in a network management system (NMS) report?
Report Template.
What process provides the overall process to secure and protect our information networks?
Barrier Reef.
What defines traffic flow and is a basic protection mechanism on routers?
Access lists.
The World Wide Web (WWW) proxy provides three benefits: it conceals internal network configuration, provides a means to monitor and eliminate traffic to unofficial WWW sites, and
provides much faster access to the internet.
What is one of the primary functions of the Network Control Center (NCC), usually done in real time, and ensures the system is being operated within the parameters established by network security policy?
System monitoring.
What security posture permits everything that is not specifically blocked?
Open.
What security posture prevents everything that is not specifically authorized?
Default deny.
What is the first line of defense when gaining access to a laptop computer’s operating system?
Logon identification and password combination.
Who has unrestricted access to system commands and data?
Superusers.
What must be employed to ensure data integrity?
Checksums.
What method is approved for changing passwords through the use of remote access?
Strongly encrypted virtual private network.
An intrusion detection system (IDS) may miss attacks that bypass the firewall like application-based attacks and
tunneling.
What type of firewall can filter messages according to a set of rules for a specific application?
Proxy server.
What are the two vulnerability scanner examination techniques?
Passive and active.
Of what does a firewall physically consist?
One or more routers and host machines with filtering software containing a series of rules that accept or reject packets of information, connection types or application specific communications attempting to cross the firewall.
What is the simplest and least expensive type of firewall, and what is its purpose?
Packet filtering firewall; to stop messages with inappropriate network addresses.
What type of firewall is used to separate secure sites, networks, or network segments from less secure areas?
Bastion host.
Name the 3 factors that affect microwave propagation.
Reflection, refraction and diffraction.
Name 3 major propagation paths and identify the radio system(s) used with each.
Ground waves, space waves and sky waves; HF and microwave frequencies.
A space wave and a reflected wave arrive at the receive antenna 180° out-of-phase. What effect will this have on the received receiver signal level (RSL)?
RSL will decrease due to partial or total cancellation.
What happens to the RSL when reflected waves and space waves pass in and out-of-phase at the receive antenna?
RSL will vary due to the aiding and opposing of the 2 signals.
How much further is the radio horizon than the true horizon in a standard atmosphere?
33% further
K experiences a significant decrease in value. What effect does this have on the radio horizon?
Wave is bent more and radio horizon decreases an is known as superstandard refraction.
As the atmosphere becomes less dense, what happens to the speed of the propagated wave?
As K varies, the distance the wave travels to the radio horizon varies, causing fading at the receive antenna.
Define the term diffraction?
Down bending of radio waves as they graze the surface of an obstruction.
What determines the size of the waveguide?
Wavelength of the energy to be transmitted.
What is the waveguide’s cutoff frequency?
A limiting frequency below microwave range where it cannot transmit a signal.
How many miles are satellites placed in orbit and why?
22,300 miles above Earth to maintain stability. At this distance the satellite does not fall back to Earth and does not drift off into space.
In what way is satellite communications a deficiency?
Transmitting on uplink is secure; transmission on downlink is in broadcast mode which makes it unsecure.
Name 2 satellite communications systems.
AFSATCOM / DSCS
Why is modulation used?
To transmit audio frequencies over appreciable distances and to send more than 1 message at a time over same medium.
What is the frequency bandwidth of a high frequency signal?
3 - 30 MHz
What are the 2 paths that an HF signal can travel?
Ground wave & sky wave transmission.
What is referred to as coherency?
Properties of a laser light that make a narrow beam and does not diverge or spread out like light from a flashlight.
Name 3 disadvantages to laser light transmission?
Laser light is strictly a LOS transmission media. Great care is required to properly align the transmitting and receiving equipment. Laser light is susceptible to atmospheric interference, and cannot penetrate walls or very thin coverings such as curtains or paper.
What is one of laser light transmissions greatest advantages?
No FCC license is required. Equipment is moderate in cost and undetected eavesdropping is difficult.
Broadband is a term that refers to what type of signaling method?
Signaling method that can handle a relatively large range (band) of frequencies.
Give 2 examples of broadband technology.
ADSL / Cable TV
What transmission media can utilize broadband signaling?
Copper, fiber, or wireless
What are the 2 main interfaces used in ISDN?
PRI and BRI
There are 2 channel configurations for PRI, what are they?
30 bearer channels and 2 delta channels for E1.
23 bearer channels and 1 delta channel for T1.
What is the primary application for PRI connections?
Higher xfer speeds and call setup times.
What are the 2 uses for BRI in the military?
Video teleconferencing & STE.
How is voice transmitted and received by a telephone?
Voice of talker vibrates membrane that has magnet attached to it. Magnet causes changes in current in coil. Current changes are transmitted to speaker on other end causing another membrane with a magnet attached to vibrate and reproduce the sound.
The telephone exchange system was developed to address what problem?
Get rid of point-to-point setup
What was the impact of conversion from manual switchboards to electro-mechanical switches?
Electro-mechanical switches = Speed and reliability and allowed telephone companies to cut personnel costs.
What is a dial tone signal?
User that the telephone line is connected to the switch and is ready to transmit dialing digits.
What are the 3 cornerstones of voice network system security?
Confidentiality, Integrity and Availability
Inadvertent disclosure of communications violates which cornerstone of voice network system security?
Confidentiality
Problems that affect the QoS and functionality customers require are related to what cornerstone of voice network system security?
System Integrity
Ensuring redundancy in a voice network system so that system operations are maintained if there is a failure at any single point in the system relates to which cornerstone of voice network system security?
Availability
PBX switches generally handle what kind of traffic?
Internal call traffic and connection to outside public switched telephone network.
What types of services can the Meridian Option 11C PBX support?
60 - 720 lines. VoIP, ISDN BRI, VM, Call center operations.
What are the 2 models of the DMS-100?
DMS-100 & MSL-100
What is the maximum # of ports that a fully-expanded DMS-100 and MSL-100 can support?
DMS-100 = 100,000 ports
MSL-100 = 30,000 ports
What is the physical difference between the DMS-100 and MSL-100?
DMS-100 = 6-foot equipment racks.
MSL-100 = 6-foot modular cabinets.
Which major area monitors and controls all system activity by executing stored computer programs?
Central control area
What are the elements that make up the control components for the SuperNode central control area?
CM, SLM, MS
What is the SLM used for?
Boot load CM and MS from disk/tape, load an office image into the inactive CPU, dump an image to disk, perform offline transfers from tape to disk.
What 3 services/facilities does a PM interface?
Analog/digital trunk, subscriber lines and test/service trunks.
What component in a PM performs local processing functions?
PP
How many analog circuits can be connected to a TM8?
30
How many line cards are controlled by one of the two processors in an LCM?
320
How many LCM’s can occupy a single bay?
2
Which major area provides an interface between the maintenance subsystem software and the maintenance technician?
I/O or MAP
To what central control component(s) does the IOC interface?
MC in the SuperNode
How many DC’s can be connected to 1, IOC?
Up to 9 DC Cards
What IOC card is required to interface a tape drive?
A 1X68 MTD Controller
What IOC card is required to interface a disk drive?
A 1X55 DDU Controller
What is terminated on the vertical and horizontal sides of the MDF?
Circuits routed over base cable plant leading to subscriber’s buildings are terminated on the vertical side. Equipment from peripheral area of telephone switch are terminated on the horizontal side.
What is the function of protectors installed on the MDF?
Protect switching system from damage due to high voltages that could enter the central office via the base cable plant.
What is the function of jumpers on the MDF?
Connect telephone numbers from the switching system to specific cable pairs that are routed to various telephone subscribers.
What precaution should you take before removing / replacing faulty terminal or distribution frame protectors?
Measure voltage across the protector prior to removing it to ensure dangerous voltages are not still present on the line.
What are the safety rules you need to remember when using a ladder?
Use wood or reinforced fiberglass ladders and remove any finger rings.
How many planes and shelves per plane are provisioned in a fully equipped ENET?
2 planes and 4 shelves per plane
What 2 switch functions does the ENET provide access to?
Messaging and a speech / signaling path
How many horizontal buses are provided on each ENET shelf and what is their designation?
Two H-buses per shelf designated odd and even
How many PM’s are connected to the ENET?
Hardwired to a designated port
How does a circuit entering the ENET on an odd card slot gain access to the even H-bus?
Through a V-bus extension to its mate even card
How many sections is each H-bus divided into?
8 Sections numbered 0-7
What major DMS database facility provides facilities for mapping data from its external character string format to its logical binary format?
The formatter
When changing the DMS database, you are required to name particular entries. Which major database facility stores these entries?
The data dictionary
What is the purpose of the POF system?
It provides facilities for storing DMO’s and for retrieving them at a specified time for execution
Which database facility preserves DMO on tape or disk so that data tables can be restored if the switch should fail?
The POF
What user interfaces are available on the MSM that use Meridian Mail software?
Nortel’s proprietary MMUI and VMUIF
What is the storage capacity of a single SPN?
75 or 150 hours
What are the Meridian mail user interface user options that VMUIF does not support?
TAG, timed delivery, added to an already existing recorded message and save copies of message.
How does the system notify a VMUIF mailbox user they have received a message?
Message waiting indicator (either a light on the phone or an interrupted dial tone)
What is the maximum # of submailboxes that can be partitioned from a VMUIF main mailbox?
Up to 8 submailboxes
What is a typical adminstration configuration for the MSM administration and maintenance interface?
One main system administration terminal and up to 3 MAT’s
How is remote administration access activated in the administration and maintenance interface?
From the main system administration terminal
Why did the NTSC decide to shift the R-Y and B-Y signals 33° counterclockwise?
To place the R-Y signal on the axis of maximum visual acuity and the B-Y signal on the axis of minimum visual acuity.
What were the bandwidths and limitations of the R-Y and B-Y signals, and what were the shifted signals?
R-Y is called the I signal for in-phase. Bandwidth: 1.5MHz
B-Y is called the Q signal for quadrature. Bandwidth: .5MHz
List the functions of the encoder
Derive the luminance (brightness) signal, derive the I and Q signals, use I and Q to modulate suppressed subcarrier balanced modulator to represent hue and saturation, combine luminance and chrominance signals, add sync and burst to combined luminance and chrominance signal.
What are the 5 components of the NTSC color video signal?
Luminance, chroma, blanking, sync, colorburst
What digital broadcasting system was adopted as a standard in the USA?
ATSC (Advanced Television Systems Committee)
What type of modulation is used in ATSC?
8-vestigial sideband technique
Name the format used by ATSC to provide 5.1 channel surround sound?
Dolby Digital AC-3
List the advantage of OFDM
Reduces the amount of interference caused by multipath
Explain video tape recording
Means of storing information in a memory device wherein the memory is provided by a series of magnetic patterns on tape.
What type of function is the playback process?
Voltage function
A VTR head can be compared to what?
An electromagnet
Before being applied to the head, the incoming signal in a reorder is converted to what type of waveform?
Current
List the 4 signals recorded on tape.
One video track, two audio tracks and a control track.
What is the maximum recording and/or playback time allowed by the Betacam SP format?
90 minutes on a large cassette.
List some of the advantages of digital video recording.
Superior image quality and ability to dupe down unlimited generations (cloning), edit layer upon layer of effects without quality loss, record in one TV standard and accurately reproduce in a different standard.
List 3 conversion methods available when working with digital video.
Analog-to-digital (A/D); Digital-to-analog (D/A); Digital-to-digital (D/D).
What is the purpose of the D/A converter?
Change binary data stream back into the continuous electrical waveform that a binary data stream represents.
What format is used in D2 digital recording?
A 4 fsc sampling frequency with 8-bit quantizing.
What are the benefits of XDCAM recording in MPEG HD format?
Data can quickly be transferred over computer networks and easily edited in the field with a laptop computer and made readily available to a wide variety of applications.
What is the main benefit of having time counters on VTR’s?
Timesave that enables the operator or editor to find a specific clip and/or segment at a later time.
What GVG-110 system allows you to insert titles or other video scenes into a full-screen background scene?
Effects Keyer
What can you use to fill an effects key when using the GVG-110?
Key bus video or an internally-generated color matte signal.
What type of downstream keys can you use to layer over the picture coming out of the effects keyer?
Linear or luminance
What is the purpose of the GVG-110 effects memory?
Store effects for recall later
How many effects storage registers are there in the GVG-110 switcher?
16
What circuit re-inserts reference blanking into the program output to prevent noisy sync in the GVG-110?
Blanking processor
What is the purpose of the GVG-110 GPI?
Allows remote control of information
What allows a personal computer or digital picture manipulator to remote control all of the switcher’s functions?
Serial interface
The VDA is designed for what type of video signal?
75Ω composite video signal
The VDA is capable of how much gain?
+ or - 6dB
The high frequency speaker is adjusted to maintain flat response through what frequency?
5.5 MHz
Which stage of the VDA has the provision for delay adjustment?
Fixed gain and level shift
In the output driver of the DA, what assures a linear operating characteristic?
Generous amount of feedback
What is a head-end system?
Beginning of a cable system
State the purpose of a head-end system.
Master facility that receives TV signals for processing and distribution over a cable TV infrastructure.
What device is used to combine the different channel inputs received into one output for distribution?
Modulator (multiplexer)
What device is used to make up for cable losses in the line?
Trunk amplifiers
What factors should you take into consideration when planning the installation of an IDS?
Equipment capabilities and limitations, mission criticality and threat to resources that are to be protected.
What must a line of detection detect?
A person walking, running, rolling crawling or jumping through line of detection.
What is the main purpose of a boundary fence?
Present a physical and psychological deterrent to unauthorized entry.
What does a clear zone consist of?
A 30 foot area inside and outside the site perimeter fence.
Why does the area lighting need to illuminate the interior of the restricted area?
To help personnel detect and track intruders.
How does an IDS assist SF capabilities?
Increase detection capability by alerting security personnel to an approach, intrusion or attempted intrusion.
Why type of system should the installed IDS be?
A closed system, not allowing access from external source.
What is the point from which control of personnel and vehicle entry is conducted?
Entry control facility
How many hours of battery power are needed to operate sensor, alarm, delay/denial and communication components in case of an AC power failure?
4
What sensors provide an early detection and near real-time assessment to any attempt to penetrate the perimeter security system?
Exterior sensors
What are the primary parts of the AN/GSS-39 system?
Main control panel, mixture of sensors, associated equipment.
When the SPCDS annunciator is used in the IDS, what control unit should be used?
Advisor VIII
What information can be obtained from the ZIPS?
What sensors have gone into alarm since it was last reset
Why is the model TROS 8/4 multiplexer used with the STAS and SMAS instead of Advisor VIII?
Multiplexers are standard equipment with these annunciators and directly interface with them
What are the IIDS’s primary AC power requirements?
115 or 220 VAC; through a step-down transformer to the 12 VDC power supply.
What is the frequency of the tamper alarm?
26.3 kHz
What is a dual-phenomenology sensor?
One that uses a combination of microwave and passive infrared sensors in the same physical circuit and housing
How many feet of coverage does the DR-301, PIR sensor provide?
35
How many frequencies are there in a SD80DC microwave sensor and what is the minimum and maximum frequency range?
10 frequencies. 9.45 and 10.545 GHz
What is the minimum and maximum range of control, in feet, for the PIRAMID sensor, model SDI-76?
15 - 75 feet
What is the maximum coverage, field of view, # of beams of a SDI-76 sensor equipped with the standard high-density lens?
75 x 75 feet; 100 degrees; 24 beams.
What is the difference between the FPS-2 and FPS-2-2R?
FPS-2 is single-channel and can cover up to 100 meters. FPS-2-2R has 2, 100 meter zones.
What has been done to the FPS cables to help detect cuts or shorts?
A 1 megaohm resister is placed in the end of the line termination kit.
In a typical Air Force installation, how much area can the E-Flex II cover?
Up to 1,000 feet (300 meters)
How, if at all, can cutting of the E-Flex II cable be detected?
If the cable is cut, resistance drops and causes a supervision tamper alarm.
What is the purpose of the TWS’s?
To detect an intruder climbing over or through the barbed wire of a security fence.
What tension should be maintained on the TWS’s?
90 + or - 15 lbs.
What is the maximum allowable distance the barbed wire can be pulled before an alarm is generated?
6 inches
What is the normal length of a VTWS sensor sector?
328 feet (100 meters)
What type of IR technology does the Birdseye use?
Active
How many sensors does a typical Birdseye sector transmit/receive pole contain?
- Transmit pole: 6 transmitters / 3 receivers. Receive pole: 6 receivers / 3 transmitters.
How does the detection pattern change, if a sector is set up to cover an area of 175 feet instead of 125 feet?
Each transmitted beam is sent to two receivers.
What is the maximum intrusion detection barrier length that an IPIDS system can provide?
80 meters
For how long will a generated alarm signal remain active on the IPIDS?
2 seconds or as long as the beam is broken.
How can the MFS detect intruders?
By an intruder breaking the beam or by multipath return signal.
Normally how many MFS’s are used to establish a microwave line-of-sight detection sector?
Two (one transmitter and one receiver)
Describe the subcarrier frequency in a MFS.
Amplitude modualtion frequency that canc be set to 3, 5, 8, or 13 kHz.
What is the purpose of the multipath/amplifier detector?
It looks for increases in the fluctuation level of this signal caused by an intruder disturbance of the multipath field and generates an alarm when fluctuations are large enough.
The P-MUX provides what functions?
Multiplexing / demultiplexing of aggregate signals.
What are the different categories of cards found in the Promina Multiplexer?
Common equipment, voice/data/trunk and server cards.
What is the C-Bus used for?
Communication with other cards in Promina.
The PLM’s flash memory provides the data storage of what?
Boot code, system software and config database.
The USD card’s port 0 can be used for what purpose?
Accept an external clock for network synchronization.
The purpose of the PRC (Primary Rate Card) is to?
Provide and manage incoming/outgoing calls to network.
Symmetric trunk operation means?
Both directions of trunk (transmit and receive) operate at the same bit rate and all calls that traverse the trunk are symmetric and full-duplex.
What is the purpose of the CM?
Encryption and decryption; convert traffic to/from NRS/CDI, reachback and internal ICAP equipment; receive GPS timing for external timing interface of P-Mux.
KIV 19A
Encrypting NRZs signals at data rates between 9.6 Kbps and 13 Mbps
CV 8448D
Converting NRS signals to Balanced, Unbalanced or Optical CDI signals.
True Time Xli/Zypher GPS Receiver
Disciplined precision timing reference
The crypto module is typically found where in the TDC network?
Located between P-Mux and ground satellite terminal.
The True Time Xli/Zypher GPS receiver can provide what range of clock rates?
8 KHz to 8192KHz
What are the differences between the KIV 19 and the KIV 19A?
KIV19A provides enhanced features that enable configuration of local strap settings using the control panel.
What is the CV8448 necessary?
Data interfaces like EIA-530 are designed for short interoffice connections and the 25 wire cables used for this standard are too bulky for long distance tactical use.
What application does the FCC-100 Tactical Module have in the TDC network?
To provide low rate communiations channels to smaller sites.
What services does the FCC-100 provide?
It can serve as a long local telephone channel for TRI-TAC devices or common two-wire desk telephones or fax machines, and for NRZ or CDI data channels.
What task does the CIM normally perform in the TDC network?
Acts as the external router for secure / non-secure data network.
The Cisco 3460 and 3745 modular routers provide what for the ICAP data backbone?
Connectivity between classified or unclassified ICAP backbon
What devices are compatible with the KIV-7HS/HSB?
KIV-7HS/HSB; KIV-7 or KG84
When is the CV 2048-M/CV 8448-D used?
When CIM and P-Mu are not in the same location.
What are the primary components of the BAM v3?
REDCOM IGX-C and 2 Cisco switches
What role does the BAM play in the deployed TDC network?
Voice and data access for 50 users in a single location
What cards are required for operation of the REDCOM IGX-C Circuit switch?
Modular Switching unit (MSU), Expanded Timeslot Interchange Board (ETSI), Ringing Generator Card.
What is the main limiting factor in the configuration of the IGX switch?
Limited # of timeslots
How does stacking work with the Avaya Prologix Switch?
Can only be stacked in pairs, with the 2nd switch in the stack acting as a pair of expansion shelves with no processing capability.
What signaling can the Avaya DS1 card be configured to support?
DTMF, Multi-frequency and Primary Rate Interface
What purpose does the tactical interface gateway serve?
Provides backwards compatibility with TRI-TAC devices such as tactical radios, DNVT and DSVT’s
What are the Cisco switches in the BAM used for?
Connect workstations and other network devices
What is the normal data path for the Red Data Module to send traffic to a SIPRNet user on a TDC network?
SIPR traffic comes through Promina as encrypted. Pass through KIV-7 to be decrypted. Decrypted traffic is routed to TACLANE which then encrypts each IP frame before sending back through black network. Client RDM then decrypts the frames for reception by SIPR user.
What type of encryption does the TACLANE utilize?
Ethernet frame encryption
The MRV console server provides what service?
Secure remote configuration and management of TDC modules.
What components make up the NGRT?
Reflector dish, tracking receiver and pedestal motor assembly with tripod.
What purpose does the STRC have in the AF IP Receive Suite?
STRC contains all the computer elements required for operating the NGRT, including initial heading settings for satellite acquisition and test circuitry for troubleshooting.
What is the function of the RBM?
Receives data streams sent by satellite through NGRT and relay that information to the subscribers connected to the terminal.
What is the difference in function of the Type 1 and Type 2 RBM?
Type 1: Military specific / classified data.
Type 2: Handles commercial / unclassified data.
What does the video converter in the RBM do?
Takes input signal and converts it to an NTSC standard video signal.
What is the difference in equipment between the Type 1 and the Type 2 RBM?
Type 1 RBM contains a crypto unit to decrypt military specific information carried in the data feed from the Type 2 RBM. Type 2 RBM contains an IRD to extract data content from the incoming video stream and to transmit that data to an Ethernet switch for distribution. The IRD also descrambles the video content before processing.
What is an RFS?
A request for communications service from a user to DISA.
What is a TSR?
A request to staff, stop, or change circuits, trunks, links, or systems.
What is the purpose of the TSO?
To authorize activations, deactivations, or changes to circuits, trunks, links, or systems. It also gives the
O&M agencies authority to procure equipment.
Who normally receives TSOs?
All DII stations that a trunk or circuit traverses, the designated DII control office, the leasing agency
(if applicable), and other DISA area offices if the trunk or circuit enters their area. Information copies of the
TSO are sent to the O&M agency, the TCO and the user of the circuit or trunk.
What does a SAM identify?
Time for installation of the leased service at your facility, contract service completion, delay in service,
contractor supplies information (that is. reference number, cost, service date), any additional information
that is required.
Where do you look to determine circuit requirements of circuits composed entirely of
government-owned facilities?
DISAC 300–175–9, DII Technical Schedules.
The TSO issuing authority keeps current listings of circuits accepted for service that do not meet
required parameters and ensures what?
Outstanding exceptions are cleared at the earliest possible date.
A TSO designated DII facility must do what for initial acceptance of a leased circuit?
(1) Ensure that leased circuit segments meet all circuit parameters for the ToS specified in the TSO.
(2) Contact the TSO issuing authority when the carrier fails to meet all required circuit parameters.
List the three types of reports used by the CCO for circuit activation.
In-effect, exception, and delayed service.
What is the purpose of the trend analysis program?
The program trends the number of outages, outage times, reason for outage, calculate availability and
reliability, and determine if circuit reliability meets MT on a monthly calendar basis.
When are outages analyzed to determine if corrective actions are required?
Anytime a link, trunk, or circuit fails monthly MT.
Who do you notify when a circuit fails MT for three or more consecutive months?
The CCO, or servicing SCF/PTF, should notify the appropriate LCC/NCO and O&M command of all links,
trunks, and circuit that fail MT for three or more consecutive months.
How many character positions are there in a trunk identifier?
Six.
Which position of a trunk identifier would indicate the receive side area of a trunk?
Second position, the “To” area.
What publication can you use to locate the codes of trunk identifiers?
DISAC 310–65–1.
Which position of a trunk number indicates the type of trunk or media?
Fourth.
What is the purpose of a CCSD?
To provide each circuit a specific identity for reporting and status keeping.
What position and part of a CCSD contains the type of circuit identified?
Fourth position, third part.
What are the two classes of CCSDs?
Permanent and temporary.
Who has responsibility for constructing and assigning temporary CCSDs?
SCF Technician.
What are the two parts of the TSP restoration priority code?
(1) TSP provisioning priority field.
(2) TSP restoration priority field.
When restoring circuits, what type of facility do you use first?
Use all available spare channels first.
One disadvantage of microwave wavelengths is that the frequencies are susceptible to
weather effects
What is not a factor in determining the refractive index of air?
Propagation medium.
The determining factor in calculating the correct size of a waveguide is
frequency.
How many miles above the earth are satellites placed in orbit?
22,300.
Which satellite communications system is used to transmit space operations?
Defense Satellite Communications System (DSCS).
To transmit an audio signal over radio frequency (RF), it first has to be
modulated.
What is one path high frequency (HF) transmissions follow from the antenna to the distant end?
Groundwave.
Which is not a disadvantage of laser light transmission?
No need for careful alignment of transmitter and receiver.
Broadband refers to a technology that can transmit
a relatively wide range of frequencies.
Broadband technology uses all of these transmission mediums except?
laser light.
The Integrated Services Digital Network (ISDN) configuration normally used to connect
primary rate interface (PRI).
How many B and D channels does the standard configuration in North American Integrated Services Digital Network (ISDN) primary rate interface (PRI) application use?
23, 1.
What was the primary driving factor behind the invention of the telephone exchange
system?
Point-to-point telephone access caused cabling issues.
When a telephone network is circuit switched, each call
has a dedicated circuit created by the switch.
The three cornerstones of voice network system security are availability,
confidentiality, and integrity.
What is the most serious threat to voice network system integrity?
Subversion
What role does the Private Branch Exchange (PBX) play in the telephony industry?
A small scale switch that handles internal calls for an organization.
How many serial data interface ports does the Meridian Option 11C Small System
Controller have?
3.
Which models of the digital multiplex system (DMS) family are commonly used at Air
Force bases to provide base telephone services?
DMS-100 and Meridian System Logic (MSL)-100.
Which elements make up the control component of the SuperNode central control?
CM and system load module (SLM).
What link is used to connect the digital multiplex system (DMS)-core to the DMS-bus?
DS-512.
Which major component of the NorTel digital switching system (DSS) interfaces line and
trunk subscribers?
peripheral module (PM).
What components are directly connected to the input/output controller (IOC)?
A pair of SuperNode message controllers and the device controllers.
Base cables normally enter the central office (CO) facility through a
cable vault.
The primary reason you should measure the voltage across terminal or distribution frame protectors before removing and replacing them is to
ensure dangerous voltages are not present on the line.
Where do incoming unswitched circuits from a peripheral module (PM) enter the NT9X35A cross-point card matrix?
Vertical bus.
Because the enhanced network (ENET) is a matrix, any input channel has access to any available
output channel.
Which digital multiplex system (DMS)-100 database facility is responsible for creating and maintaining tables of data in a controlled manner?
Table control.
Which digital multiplex system (DMS)-100 database facility provides facilities for storing data modifications orders (DMO) and for retrieving them at a specified time for execution?
Pending order file.
Which digital multiplex system (DMS)-100 database facility provides facilities for
preserving data modifications orders (DMO) on tape or disk so that data tables can be restored if the system should fail?
Journal file.
What voice mail interface has the capability to support the temporary absence greeting (TAG) feature?
Meridian mail user interface.
What voice mail interface allows a user’s mailbox to be partitioned into a main mailbox and up to eight submailboxes?
Voice Messaging User Interface Forum.
Why are the R-Y and B-Y signals shifted 33° counterclockwise?
R-Y was shifted to maximum and B-Y was shifted to minimum color acuity, respectively for
human vision.
The red, green, and blue (RGB) outputs from the camera go to the
encoder.
What modulation technique is used by the Advanced Television Systems Committee
(ATSC) system?
8-vestigial sideband (8-VSB).
What modulation technique is used for Digital Video Broadcasting - Cable transmission?
a. Motion Picture Experts Group (MPEG)-1.
MPEG-2.
How many lines of video are discarded in high-definition 1080 line video encoded with 1920x1088 pixel frames prior to display?
8.
How is information recorded or stored on the videotape?
Series of magnetic patterns.
You can compare a video tape recorder (VTR) head to a/an
electromagnet.
What function in a video tape recorder (VTR) is accomplished by transporting the videotape
across the head gap at the same speed at which it was recorded?
Playback.
An important concept to understand is that digital video is merely an alternate means for
minimizing video loss.
What is a major advantage of digital recording over analog recording?
Material can be edited generation after generation without noticeable degradation in quality.
Which digital video tape format uses a 4:2:2 standard, with an 8 bit sampling rate, 19mm
wide tape, and has a 94 minute recording time?
D1.
What is the means of measuring the amount of time that has been played or recorded on a
video tape recorder (VTR)?
Counter.
What part of the video switcher allows titles or other video scenes to be inserted into a full screen background?
Effects keyer.
The GVG-110 video switcher effects key fills with
key bus video or an internally-generated color matte signal.
The purpose of the GVG-110 general purpose contact-closure editor interface (GPI) is to allow
remote control of switcher transitions.
The GVG-110 video switcher serial interface allows
remote control of the switcher by a personal computer or digital picture manipulator.
What are the frequencies at which the two common mode nulling adjustments are set in the video distribution amplifier?
60 Hz and 5.5 MHz.
What is the beginning of a cable system called?
Head-end.
What device is used to combine TV channels into a single line?
Modulator.
What component carries the signal to individual subscribers?
Trunk line.
What must a line of detection detect?
Walking, running, rolling, crawling, or jumping through the line of detection.
What is the main purpose of a boundary fence?
To present a physical and psychological deterrent to unauthorized entry.
The security lighting inside the restricted area is used to
facilitate the detection and tracking of intruders.
The basic configuration of the entry control facility (ECF) includes a
gatehouse, personnel entry gate, inspection equipment, and vehicle entrapment area.
What interior intrusion detection system (IIDS) is designed to detect intruders attempting to
enter a shelter, storage igloo, or building?
AN/GSS-39.
What annunciator is used with the Advisor VIII control unit?
Small permanent communications and display segment (SPCDS).
What does the AN/GSS-39 system use to monitor the integrity of all sensor wiring to the
control panel?
EOL module.
Which sensor uses heat radiation to detect intruders?
Passive infrared.
What is the range of the alternate current (AC) presence time delay relay in the AN/GSS-39 system before a power loss is reported?
1.5 to 15 seconds.
Between what ranges can you adjust the SDI-76 microwave sensor?
15-75 feet.
What type signal is sent to the fence protection system (FPS) signal processor when an
alarm is detected?
Analog.
A standard Air Force E-Flex II monitors how many meters?
300.
Which is not a selectable option of the E-Flex II system?
Sector reporting priority.
What is the maximum length of the vertical taut-wire sensor (VTWS)?
328 feet.
What is the maximum length of the Y taut-wire sensor (YTWS)?
200 feet.
What type alarm occurs if the sensor post cover in vertical taut-wire sensor (VTWS) is
removed?
Tamper.
In the event of a power failure, how many hours can the vertical taut-wire sensor (VTWS) remain operational?
4.
How many inches is the beam width at the widest portion of the infrared perimeter detection
sensor?
2.
At what distance does the detection pattern of the infrared perimeter detection sensor
(IPDS) transmitters change, and to what pattern does it change?
150 feet; signal transmitted to two receivers.
What is the operating frequency of the synchronizing oscillator in the “A” sensor post of the infrared pulsed intrusion detection system (IPIDS)?
1200 Hz.
What is the primary mode of detection for the microwave fence sensor?
Beam break.
When aligning a microwave fence sensor, what reading do you look for from the automatic gain control (AGC) using a multimeter?
Lowest possible.
How does the T-Bus relate to the function of the Promina?
The information that is multiplexed/demultiplexed travels over the T-Bus.
Asymmetric trunk operation provides more efficient use of bandwidth by
not utilizing the bandwidth in the opposite direction of a one-way call.
Which module provides encryption/decryption of traffic into and out of the theater deployable communications/integrated communications access package (TDC/ICAP) network?
Crypto.
If all deployed and fixed locations use global positioning system (GPS) referenced clocks,
we can eliminate crypto-sync loss due to
timing slips.
What is the maximum number of channels of voice and/or data traffic that the FCC-100 can
handle?
16.
How many card slots does the FCC-100 have, and how many of them are available for user
configuration?
16, 8.
For either secure or nonsecure data network in theater deployable communications (TDC),
the Crypto Interface Module’s router normally acts as the
external router.
For a theater deployable communications (TDC) network design that has the crypto
interface module (CIM) and the Promina Multiplexer (P-MUX) in separate locations, which piece
of equipment is necessary?
CV-2048/8448-D.
The Integrated Services Digital Network (ISDN) Gateway Exchange (IGX) switch allows
for stacks of up to 8 IGX switches, while the Avaya Prologix switch can operate in a stack of.
2.
The tactical interface gateway (TIG) uses what protocol to allow backwards compatibility between the Avaya Prologix and legacy Triservice Tactical Communications (TRI-TAC)
equipment?
Internet.
What configuration does the Red Data Module normally operate in?
Gateway/client.
The next generation receive terminal (NGRT) accepts feeds from which two satellite bands?
Ku, Ka.
What receive broadcast manager (RBM) processes military specific and classified
information?
Military.
Which piece of the receive broadcast manager (RBM) functions as a common television settop
converter box?
Video converter.
A status acquisition message (SAM) is sent from
Defense Informaiton Technology Contracting Office (DITCO).
Circuits that fail to meet all parameters specified in the appropriate technical schedule when
test and acceptance (T&A) is done may not be accepted for service without the express approval
of
the Telecommunications Service Order (TSO) issuing authority.
Within how many normal duty hours of completion action on the Telecommunications Service Order (TSO) must the circuit control office (CCO) submit an in-effect report?
72.
What report must be sent if the circuit does not meet all required parameters and the
Telecommunications Service Order (TSO) issuing authority advises that the circuit is accepted for service?
Exception.
Trend Analysis is a program that trends all of these outage data except
preempted outages.
Trend Analysis is a program that ensures circuits meet management thresholds (MT) on
what basis?
Monthly.
If a circuit fails its management threshold (MT), what test might be performed?
Quality control (QC).
The first position of a trunk identifier indicates the
“from” (sending) station.
Which Defense Information Systems Agency Circular(s) (DISAC) contain information
needed to assign a temporary command communications service designator (CCSD)?
310-70-1 and 310-55-1.
Which office or system confirms a restoration priority?
National Communications System (NCS).
What are the two parts/priorities to the Telecommunications Service Priority (TSP)?
provisioning and restoration.