EXAM Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is the definition of the combat system?

A

The combat system is the set of person and machine resources which comprise the fighting capabilities of the vessel. Sub-systems will include weapons, sensors, intelligence and information sources and the combat management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the definition of the combat management system?

A

The combat management system is a military management system, comprising a close integration of person and machines which together enable:

  • The production of a comprehensive tactical picture
  • formulation and issuing of directives for the deployment of available resources
  • monitoring compliance with directives and the extent to which they may require modification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the time critical components of naval C2 and what are their definitions?

A

Tactical Data Fusion - The real-time integration of diverse onboard and external data to create a coherent operational picture, involving multiple sensors and platforms.

Situation Assessment - The tactical evaluation of a ship’s environment, considering threats, engagement outcomes, rules of engagement, sensor and weapon coverage, plan monitoring, and surveillance to determine the effectiveness of all forces involved.

Resource Allocation - The strategic deployment of resources in response to the situation, involving rapid coordination of platforms, sensors, and weapons at both force and single ship levels, often using pre-programmed autonomous actions.

Resource Planning - Deployment of resources in anticipation of a future situation using knowledge, including intelligence, to predict what might happen and how own forces should be deployed to counter any threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the defined timescales that the CMS operates over?

A

Long term - -Planning and resource allocation over major sea areas for periods from a day to months.

Medium Term - Planning and resource allocation over a thousand miles for hours to days.

Current - Short-term management of resources to meet tactical demands within a few hundred miles and seconds to minutes.

Immediate - Control of individual resources in response to sudden changes, with time-scales from minutes to fractions of seconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the definition of the command system?

A

The Command System is the logical grouping of personnel and machines responsible for the immediate to current activities of the Combat Management System and for the management of the Combat System in the short term.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the definition of the combat support system?

A

The Command Support System is the logical grouping of personnel and machines responsible for the medium to long term activities of the Combat Management Systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give a technical description of each system architecture.

A

Centralised - structure which comprises one (or a small number of) central functional processor carrying out all data handling compilations and control functions.

Characteristics of a Centralised Architecture:
• Difficult and expensive to amend/enhance.
• Single point of failure, limited redundancy.
• Vulnerable point to point links.
• Heavy loading on central computer.

Federated - structure which comprises a number of subsystems which are autonomous in data handling to a certain degree, but are still controlled to a certain degree by one (or small number) controlling computer.

Characteristics of Federated architecture:
• Load on central computer reduced.
• Still require controlling computer.
• Degree of distributed processing.
• Utilises serial highway or LAN so increased flexibility for expansion.
• Communication protocol or standard required.

Distributed - structure which divides the data handling load via the processors in the system without using fixed or central points. (In essence blade server technology.)

Characteristics of Distributed architecture:
• No single point of failure.
• Complex data handling required.
• Increased redundancy - single member system loss does not affect whole system.
• Utilises serial highway or LAN so increased flexibility for expansion.
• Communication protocol or standard required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the possible problem areas of NEC?

A

Over-Control - NEC enables Mission Command, allowing subordinates to act on shared situational understanding, but protocols may be needed to prevent excessive control by commanders.

Information Overload - Increased information requires training, system tools, and a culture of sharing and trust among services and coalition partners.

Information Assurance (IA) - Growing network dependence increases vulnerability to cyber attacks, necessitating new measures for information protection and network resilience.

Procurement - NEC requires integrated systems and development projects, demanding radical changes in procurement processes for successful implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 levels that NEC will impact?

A

NEC at the Strategic Level - Enhances cross-government planning, campaign management, and collaboration with allies and partners.

NEC at the Operational Level - Connects headquarters, allied and coalition HQs, and defense support organizations.

NEC at the Tactical Level - Improves information sharing, command intent, collaborative work, and integrates sensors and decision-makers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does JOCS stand for and what is it?

A

Joint Operations Command System

JOCS is a Tri-Service network based at PJHQ Northwood, forming part of the Joint Command Systems Initiative. It operates through interconnected LANs and WANs, providing secure, deployable communication and data integration for military and coalition operations worldwide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the OSI Layers:

A
  1. Physical Layer
    - Function: Transmits raw binary data over physical mediums.
    - Examples: Cables, Wi-Fi, radio signals.
  2. Data Link Layer
    - Function: Transfers data frames, error detection, and correction.
    - Examples: MAC addresses, switches.
  3. Network Layer
    - Function: Routes data packets and handles addressing.
    - Examples: IP addresses, routers.
  4. Transport Layer
    - Function: Ensures reliable data transfer and flow control.
    - Examples: TCP, UDP.
  5. Session Layer
    - Function: Manages sessions and connections between applications.
    - Examples: Remote desktop sessions.
  6. Presentation Layer
    - Function: Translates, encrypts, and compresses data.
    - Examples: SSL/TLS, data formats (JPEG, MPEG).
  7. Application Layer
    - Function: Provides network services to user applications.
    - Examples: Web browsers (HTTP), email (SMTP), FTP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Bandwidth?

A

The amount of data that can be transmitted over a network cable at one time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is attenuation?

A

The gradual weakening of a signal as it passes through a wire or other medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Star, Ring, Bus and Mesh topology

A

Sure, here are concise definitions for each network topology:

Star Topology
- Definition: All devices are connected to a central hub or switch.

Ring Topology
- Definition: Devices are connected in a circular chain, with each device connected to two others.

Bus Topology
- Definition: All devices share a single communication line or cable.

Mesh Topology
- Definition: Each device is connected to multiple other devices, creating a network of interconnections.

Hybrid Topology
- Definition: A combination of two or more different network topologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the major internet working devices and what layer do they belong in?

A

Repeaters
- Definition: Devices that amplify and regenerate signals to extend network range; operate at the Physical Layer (Layer 1).

Routers
- Definition: Devices that route data packets between different networks; operate at the Network Layer (Layer 3).

Bridges
- Definition: Devices that connect and filter traffic between two network segments; operate at the Data Link Layer (Layer 2).

Gateways
- Definition: Devices that translate data between different network protocols; operate at multiple layers, often including the Application Layer (Layer 7).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compare and contrast UTP, STP, Fibre and Coax.

A

UTP (Unshielded Twisted Pair)
- Pros: Inexpensive, easy to install, and flexible.
- Cons: Susceptible to electromagnetic interference (EMI).
- Uses: Commonly used in Ethernet networks and telephone lines.

STP (Shielded Twisted Pair)
- Pros: Reduced EMI due to shielding.
- Cons: More expensive and less flexible than UTP.
- Uses: Environments with higher interference, such as industrial settings.

Fibre (Optical Fiber)
- Pros: High bandwidth, long-distance transmission, immune to EMI.
- Cons: Expensive and complex installation.
- Uses: Backbone networks, long-distance telecommunications, and high-speed internet.

Coax (Coaxial Cable)
- Pros: Durable, good at resisting EMI, and suitable for high-frequency signals.
- Cons: Bulkier and less flexible compared to UTP and STP.
- Uses: Cable television, internet connections, and early Ethernet networks.

17
Q

Draw and explain packet switching.

A

Packet switching breaks messages into smaller packets that travel independently through the network. In the diagram, packets (1, 2, 3, 4) take different routes via network nodes (PSE) and are reassembled at the destination (Packet Mode Terminals). This ensures efficient and reliable data transmission.

18
Q

Draw and explain message switching

A

Message switching sends entire messages from node to node. In the diagram, messages (1, 2, 3) are forwarded through intermediate nodes (A, T) until they reach the destination, where they are reassembled and delivered.

19
Q

Draw and explain circuit switching

A

Circuit switching establishes a dedicated communication path between two computers for the duration of the session. In the diagram, nodes (A - Access Nodes, T - Trunk Nodes) create a continuous, exclusive path for messages (1, 2, 3) to travel directly from the source to the destination.

20
Q

Define VLANs WTAD.

A

Virtual Local Area Networks (VLANs) segment a single physical network into multiple logical networks. In the diagram, devices in VLAN1, VLAN2, and VLAN3 are logically separated even though they share the same physical backbone infrastructure. This separation reduces traffic flow and enhances security by isolating network segments, ensuring that data from each VLAN is treated as distinct and independent.

21
Q

Define private IP addresses and give an example

A

Private IP addresses are IP addresses used within a private network to allow devices to communicate with each other. They are not routable on the public internet.

Example: 192.168.1.1

22
Q

What parameters can a firewall check?

A
  • the packet’s source and destination address
  • its protocol
  • port number