CSEP

WHAT DO I SAY...

Get Started. It's Free
or sign up with your email address
CSEP by Mind Map: CSEP

1. TASKS

1.1. AFSC RESPONSIBILITES

1.1.1. ESTABLISHING PRIORITIES, MAINTAIN, TEST, T/S, UPGRADE, DISMANTLEING, COMMUNICATIONS & CKTS.

1.2. HAZARDS OF AFSC

1.2.1. ELECTRICAL HAZARDS, ESD, LASER, LADDER.

1.3. COMMERCIAL STDs

1.3.1. RS-232

1.3.1.1. 25 PIN IN AN UNBALANCED CONFIGURATION

1.3.2. RS-530

1.3.2.1. 25 PIN IN A BALANCED CONFIGURATION

1.3.3. RS-449

1.3.3.1. 37 PIN IN A BALANCED CONFIGURATION

1.4. LOGRITHMIC UNITS OF MEASUREMENT (VU, DB, DBm)

1.4.1. DB

1.4.1.1. UNIT OF MEASURMENT THAT IS USED IN RENFERENCE TO THE RATIO OF 2 QUANTITIES. HAS THE ABILITY TO REPRESENT VERY LARGE/SMALL NUMBERS.

1.4.2. DBm

1.4.2.1. USED TO REFER TO MILLILWATTS, 0DBm=1mW, AND EVERY 3DBm's DOUBLES IN POWER. EVERY -3DBm's REDUCES POWER BY HALF.

1.4.3. VU

1.4.3.1. OLD WAY TO EXPRESS VOLTAGE UNITS IN DB, WAS USED AT 100% TO SHOW PERFECT WORKING STATUS.

1.5. CABLE OPENS

1.5.1. A CABLE OPEN IS ANYTHING THAT CAUSES A CKT's RESISTANCE TO BECOME INFINITE, THUS MAKING THE CKT INOP. A ON/OFF SWITCH CAUSES AND OPEN IN A DEVICE SO THAT NO ELECTRICITY GOES TO THE DEVICE.

1.6. INFORMATION ASSURANCE

1.6.1. THE PROCESSS OR PROCESSES OF HOW WE PROTECT OUR INFORMATION, AS WELL AS MANAGING RISKS ON THE FLY.

1.6.1.1. C.I.A TRIAD

1.6.1.1.1. 3 CONCEPTS THAT GOVERN HOW INFO IS PROTECTED.

1.6.1.2. FIVE PILLARS- TAKES C.I.A 2 STEPS FURTHER BY ADDING AUTHENTICATION & NON-REPUDIATION

1.6.1.2.1. AUTHENTICATION- HOW WE GO ABOUT VERIFYING WHAT PEOPLE CAN ACCESS SPECIFIC TYPES OF INFO. WHO GAINS ACCESS. (SOMETHING YOU HAVE, SOMETHING YOU KNOW)

1.6.1.2.2. NON-REPUDIATION- HOW DO WE VERIFY THE SOURCE OF INFO SOMEONE ELSE GAVE US. i.e; SIGNATURES- HOW DO YOU KNOW THEY CAME FROM THE PERSON THAT IS SUPPOSED TO BE SIGNING.

1.7. MULTIMETER

1.8. TREND ANALYSIS

1.8.1. THE PURPOSE OF DOING TREND ANALYSIS IS TO DETERMINE IF CKT ARE MEETING MINIMUM REQUIREMENTS SET BY DISA. CAN HELP TO IDENTIFY IF THE IS A PROBLEM, OR IF A BETTER QUALITY SERVICE.

1.9. DTE

1.9.1. A DTE IS TYPICALLY AN END DEVICE SUCH AS A TERMINAL OR A COMPUTER EMULATING A TERMINAL, IT GETS TIMING FROM AS WELL AS SYNCHRONIZES TIMING WITH THE DCE.

1.10. CSU/DSU

1.11. TIMING DEVICES

1.11.1. WE GET SOURCES OF TIMING FROM SOME SORT CLOCKING SOURCE. i.e. GPS OR SOME SORT OF CESSIUM BEAM DEVICE.

1.11.1.1. GPS TIMING

1.11.1.1.1. USES GPS SATTILITES TO TRANSMIT TIMIING THAT HAS BEEN GAIN FROM THE EARTHS PARTICULAR POSITION.

1.11.1.2. CESSIUM BEAM

1.11.1.2.1. USES THE MIICROWAVES EMITTED FROM THE ATOMIC ELEMENT CESIUM AS A SOURCE OF TIMING.

1.12. WDM

1.12.1. MULTIPLEXES MULTIPLE STRANDS OF FIBER AND USES DIFFERENT COLORS OF THE MAIN WAVELENGTH TO DETERMINE WHICH FIBER NEEDS TO GO WHERE AND WHEN TO TRANSMIT.

1.13. RED/BLACK CONCEPT

1.13.1. THE MAIN THEORY BEHIND OUR COMMUNICATIONS ENCRYPTION.

1.13.1.1. EVERYTHING THAT IS NOT ENCRYPTED THAT NEEDS TO BE IS RED. AND IF IT IS SEEN IT IS CLEAR OR WHEN IT COME TO COMM CLEAR TEXT.

1.13.1.2. EVERYTHING THAT HAS BEEN ENCRYPTED IS BLACK, IF SOMEONE TAPS INTO OUR LINKS ON THE BLACK SIDE THEY CANNOT SEE WHAT IT IS, HENCE THE BLACK. IN COMM IT IS REFERED TO AS CYPHER TEXT, WHICH IS THE RESULT OF ALGORITHMS DESIGNED TO MAKE OUR INFORMATION UN-INTERRETABLE.

1.14. INMS

1.14.1. A SYSTEM IN-LINE WITH A SPECIFIC NETWORK USED TO IDENTIFY AND CATEGORIZE ALARM EVENTS ON THE NETWORK. IN OUR PARTICILAR WORK CENTER WE UTILIZE A INS TO MONITOR THE DISN.

1.15. ESTABLISH A CALL PATH

1.15.1. IN COORDINATION WITH THE USERS AND DISA, A CALL PATH CAN BE ESTABLISHED AFTER EVERYTHING ON THE CIRCUIT HAS BEEN CONFIGURED.

1.15.1.1. FIRST THE TRUNK HAS TO BE BROUGHT ON LINE.

1.15.1.2. NEXT THE EQUIPMENT NEEDS TO BE CONFIGURED PROPERLY AND ACCORDING TO HOW SERVICE NEEDS TO BE UTILIZED.

1.15.1.3. ONCE THESE PERAMETERS HAVE BEEN MET A CALL CAN BE ESTABLISHED AND A SERVICE CAN BE PROVIDED ON THE CIRCUIT.

1.16. ROUTING PROTOCOLS

1.16.1. PROTOCOLS DESIGNED TO TELL THE ROUTER VARIES THINGS IT MAY OR MAY NOT NEED TO DO AND HOW TO THEM. MAY EVEN TELL THEM WHERE TO SEND ITEMS.

1.16.1.1. ARP- GETS MAC ADDRESSES FOR THE IP's IN ITS NETWORK. USEFUL FOR THE ROUTER TO DETERMINE WHATS IN ITS NETWORK AND WHATS NOT. ALSO USEFUL IN KNOW WHICH NETWORKS IT CAN OR CANNOT COMMUNICATE WITH.

1.16.1.2. RARP- BACKWARDS TO ARP

1.16.1.3. DHCP- TELLS THE ROUTER TO AUTOMATICALY ASSIGN IP ADDRESSES TO ANYTHING DIRECTLY CONNECTED TO THE NETWORK.

1.16.1.4. STP- PREVENTS BRIDGE-LOOPS ON MESH NETWORKS WHILE STILL PROVIDE REDUNDANT PATHWAYS BETWEEN ANY TWO NODES.

1.16.1.5. OSPF- GATHERS LINK STATE INFORMATION AND CREATES A TOPOLOGY OF THE NETWORK THEN MAKES ROUTING DECISIONS BASED ON IT.

1.17. VTC

1.17.1. DUE TO THE LARGE NUMBER OF PEOPLE IN AN ORGANIZATION SPREAD OUT ACROSS THE WORLD, LIKE THE USAF. AS WELL AS THE POPULARITY OF THE INTERNET AND IP BASED TECHNOLOGIES. WE NOW HAVE THE CAPABILITY TO COORDINATE AND HAVE MEETINGS WITH OTHERS FROM ALL OVER AT ONCE AS IF FACE TO FACE. THUS SAVING MONEY AND ALLOWING PEOPLE TO GAIN TIME THEY WOULD HAVE LOST SPENT IN TRAVEL.