• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/31

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

31 Cards in this Set

  • Front
  • Back

The Data Distribution System - Modular (DDS-M)

Provides the data communications backbone for tactical data networks. Provides WAN connectivity, LAN connectivity, and contains a server suite to provide data services to tactical users. An IP-based data networking capability for communications support to the varying organizations that are organic to a Marine Air Ground Task Force (MAGTF).

Autonomous System (AS)

A group of routers and their data networks that share a common routing policy and administration.

Interior Gateway Protocols (IGP)

Used to enable communications between different networks, they establish the common routing policy that defines the AS.

Exterior Gateway Protocols (EGP)

Used to connect together different autonomous systems and ensure traffic is able to enter and exit the AS.

Static Routing

Configured by the network administrator, and show the destination network, its subnet mask, and its next hop. More secure, most resource efficient, will always override a dynamic route.

Dynamic Routing

Ease the workload of the network administrator because they automatically learn about other networks and fill in the routing table. Find several paths to the destination and chose the best one to send traffic down.

Convergence

The process of developing the topology of a network.

The Factors Affecting Convergence

1. Occurs anytime any change is made to the network like adding networks, adding or removing a router, or the loss of communication with a router.


2. Whenever the topology of the network changes, routers must adjust for the changes and alter their understanding of the topology of the network in order to ensure that packets are routed down the right paths.

Enhanced Distance Vector Routing Protocol

Combine the best parts of Link-state and distance vector protocols. (DUAL - Bandwidth, Delay, Reliability, Load)

Most Common Enhanced Distance Vector Protocol employed within the United States Marine Corps Packet Switching Networks (PSNs)

Enhanced Interior Gateway Routing Protocol (EIGRP)

The Most Common Exterior Gateway Protocol (EGP) used to connect United States Marine Corps Packet Switching Networks (PSNs) to other Autonomous Systems (AS)/Routing Domains within the Defense Information Systems Network (DISN)

Border Gateway Protocol 4.0 (BGP)

Virtual Local Area Networks (VLANs)

Used to separate the one layer 2 broadcast domain into multiple networks based upon the desires of the data planner.

VLAN Database

The VLAN information you create on the VLAN server is stored here. The central repository for VLAN information for that VTP Domain. It is stored in the flash memory of the switch.

VLAN Trunking Protocol (VTP)

A management protocol that groups switches into a VTP domain.

VLAN Domain

A collection of switches that fall under the same VTP server and share a common VLAN database.

VLAN Trunk

A connection between switches that is programmed to allow VLAN database information and multiple virtual local area networks to traverse that connection; it utilizes VTP in order to do this.

VLAN Tagging Technologies

Interswitch Link and 802.1Q

Inter-VLAN Routing

Only a Layer 3 Device, router or Layer 3 capable switch, can route traffic between 2 VLANs. The process of routing data between VLANs within a switched LAN is the purpose of Inter-VLAN routing.

The preferred intermediary device used to perform Inter-VLAN Routing within the USMC PSN

Layer 3 switches

Spanning Tree Protocol (STP)

Was developed to prevent loops from forming on the LAN. Because there are no TTL indicators on the Layer 2 network, switching loops called broadcast storms can easily occur.

The advantages of Cisco Etherchannel Technology

1. Will balance the load accross all of the connections in the group to increase the available bandwidth.


2. Significantly increases your Bandwidth between two devices.


3. Compatible with UTP, STP, SMF, and MMF.


4. Fault Tolerance: if 1 line out of a group of 8 is cut, Etherchannel will automatically compensate.


5. For 8 ports; 100 Mbps = 800, 1 Gbps = 8.

Core Layer

1. Contains your largest and most capable Layer 3 Switches.


2. To route traffic as fast as possible around the network.


3. Located in the TECHCON or key C2 locations.


4. Usually directly connected to routers.


5. Servers and important network services are generated here.

Distribution Layer

1. Concerned with how the services that are generated at the Core Layer are pushed out to or sent to the rest of the LAN.


2. Smaller Layer 3 switches will be employed at this layer.


3. The switches at this layer will be the VTP server switches for the lowest layer.


4. Redundancy and scalability is the purpose of the Distribution Layer.


5. Multiple connections and trunks are common.


6. Isolated from the rest of the network by L3 connections.

Access Layer

1. Where users access the network.


2. User switches are connected via Layer 2 trunks to the Distribution Layer switches.


3. Configurations on switches are very simple and straight forward and the goal is simply to provide access to the user.


4. Port density and placement are main concerns.

The benefits of Layer 3 Switching

1. Protects and isolates your users, servers, and COC from anyone else.

Tunnel

A virtual path across a network that delivers packets that are encapsulated and possibly encrypted to a designated distant end. Essentially the process of encapsulating one protocol inside another.

Dynamic Multipoint Virtual Private Network (DMVPN)

1. A Cisco IOS Software solution for building IPSec VPNs in an easy and scalable manner.


2. Uses a centralized architecture to provide easier implementation and management for deployments of diverse user communities, including mobile workers, telecommuters, and extranet users in the civilian world.


3. Used in the Marine Corps specifically in the deployment of VSATs. Prevents the need for pre-configured static tunnels to add a new spoke.


4. Allows nodes to communicate directly with each other instead of through the hub.

Black Core Routing

A networking Scheme for the interconnection of core network components where all data remains IPSec encrypted (black traffic) as it is transported across the core.

Scale of employment for the KG-175 TACLANE

1. Individual user or for enclaves of users at the same security level.


2. Low-cost, type 1, key-agile, in-line network encryptor for deployment in DOD tactical and strategic networks in classified applications up to TOP SECRET.

Maximum data rate of the KG-175D TACLANE-Micro

200 Mbps

Two types of cryptographic vectors utilized in the KG-175 TACLANE

1. Pre-Placed Key (PPK)


2. Firefly