• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/81

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

81 Cards in this Set

  • Front
  • Back

What are the three JTIDS/MIDS terminal Bit tests?

1. Start up bit


2.operational Bit


3.interruptive bit (IBIT)

What are the variants of the MIDS LVT with an high powered amplifier?

1.MIDS LVT-5


2.MIDS LVT-8

What is the purpose of Notch Filter Assembly?

Ensures that IFF/SIF are not interfered with by filtering emissions in those frequencies.

What is the basic unit of access?

Time slot

What is the basic reoccurring unit of time?

Frame

What is the protocol used my JTIDS/MIDS?

Time division multiple access (TDMA)

What packing structure can transmit the most Jwords?

Pack 4- single pulse, 12 Jwords

How many pulses are in the JTIDS/MIDS transmission? Different packing structure?

1. Round trip timing message-72 pulses


2. Standard double pulse-258 pulses


3. Pack 2 single pulse- 258 pulses


4. Pack 2 double pulse- 444 pulses


5. Pack 4 single pulse- 444 pulses

What determines the pseudo random selection of the 51 center frequencies?

The TSEC crypto

What are 2 information assurance techniques used to protect integrity of transmitted data (Anti Jam)

1. Reed-Solomon error detection and correction (EDAC) coding.


2. Double pulse

What are the three access modes?

1. Dedicated access


2. Contention access


3. Machine controlled access

Dedicated access

Garenteed message delivery, TS assigned to a single specific unit. If no data to TX, TS goes unused.

Contention access

1. TS given to multiple units to TX. Terminals will only RX nearest transmission.


2. Operator controlled CA

Machine controlled access

1. TS assigned to a group of users who will statistically select a percentage of TS to transmit it.

What are the three access techniques?

1. Stacked nets


2. Multi-net


3. Dedicated time slot reuse

Stacked nets

Group of TS, same NPG, different net number. The net number produces a hopping pattern. In NDD net number 127 indicates stacked nets.

Multi-net

Usually different NPG's given different net numbers using same TSEC

Dedicated time slot reuse

Multiple platforms given the same dedicated TS. Can be used when platforms are geographically isolated.

How many nets can operate simultaneously without interference?

20

When discussing TRS which operating mode is used out of the 2 options when capacity is automatically assigned amount units without operator input?

Machine controlled TRS

Identify all 5 relay options

1. Unconditional-transmits in a designated relay TS


2. Conditional- only unit with best coverage (altitude) with Tx the relay.


3. Flood- all eligible RX's will TX the relay


4 zoom- receivers will relay the transition into anouther net


5 multi hop- multiple sequential relays of the same message.

What is needed to ensure exchange of RF link 16 info can occur?

1. LOS


2. Sufficient signal to noise ratio at receiver.


3. Sufficient electronic propagation time.

What is the preferred method for resolving independent networks?

Use a different TSEC crypto variant

What is the correct usage of crypto-time-offset, and how does time offset work?

One separate network enters an offset time, resulting in a different hopping pattern. Must take care not to return to normal time after a future TSEC has been utilized.

What set in the OPTASKLINK will be used by the JICO, link 16 managers or other authorized personnel to assign crypto short titles?

JCRYPTDAT

Which IPF setting will be utilized when conducting operational missions?

Excersise

What document provides all guidance regarding usage of the link 16 pulse deconfliction server?

CJCSI 6232/ or OPTASKLINK

Know how to calculate TSDF

Total number of possible pulses divided by 396,288= TSDF in%

Know the purpose of the network management system.

The purpose of NMS is to provide a link 16 network management process that comprises the entire spectrum of actions and functions require to design,plan, establish, and maintain a link 16 network.

Steps of the NMS (there are 5)

1. Network IER definition


2. Network design


3. Network planning


4. Network initialization


5. Network operations

J3.6

Space track

J0.0

Initial entry

J0.7

Time slot reallocation

J2.2

Air PPLI

J2.3

Surface PPLI

J2.6

Land track PPLI

J3.2

Air track

J9.0

Command

J12.0

Mission assignment

J13.2

Air platform and system status

J14.0

Parametric information

J15.0

Threat warning

J16.0

Imagery

What words comprise a J-series message?

1. Mil STD 6016 breaks down each message and word.


1initial


2extension


3continuation

Know that tracks ID's available on link 16.

1. Low track blocks, 0200-07776


2. High track blocks, 10000-77776 and 0A000-ZZ777

Section 1 of the MIL STD 6016

Introduction- covers purpose, background, policy, and concept of the message standard.

Section 2 of the MIL STD 6016

Applicable document- discusses related documents ranging from multi-national to individual platform.

Section 3 of the e MIL STD 6016

Conventions- terminology, definitions, acronyms, operator alerts

Section 4 of the MIL STD 6016

Special requirements- data registration, track # management

Section 5 of the MIL STD 6016

Detailed requirements- complete list of all J-series messages and legal values, bulk of doc. DFI's, DUI's

Section 6 oh the MIL STD 6016

Notes- change proposals

Appendix A of the MIL STD 6016

Implemented requirements- data exchange requirements

Appendix B of the MIL STD 6016

Data element dictionary- defines data elements that make up J-words

Appendix C of the MIL STD 6016

PPLI and system status- specifies PPLI, system status messages.

Appendix D of the MIL STD 6016

Surveillance- how platforms process tracks

Appendix E of the MIL STD 6016

Data update request- explains responses to data update request messages.

Appendix F of the MIL STD 6016

Threat warning- explains generation and processing of the threat warnin messages.

Appendix G of the MIL STD 6016

Electronic ware fare- detail EW messages.

Appendix H of the MIL STD 6016

Amplification- rules for amplification messages

Appendix I of the MIL STD 6016

Engagement coordination- explains use of j9.1 engagement coordination used by theater missle defense platforms.

Appendix J of the MIL STD 6016

Terminal free text- defines free text (j voice)

Appendix K of the MIL STD 6016

Weapons coordination and management- defines commands, engagement, status messages

Appendix L of the MIL STD 6016

Coordination of aircraft control- process control changes and handovers

Appendix m of the MIL STD 6016

Control- details air control uplink and back link

Appendix n of the MIL STD 6016

Formatted text- details text report messages

Appendix O of the MIL STD 6016

Anti submarine ware fare- details acoustic bearing/ range messages

Appendix P of the MIL STD 6016

Track management- explains processing of tracks and points

Appendix Q of the MIL STD 6016

Imagery- defines imagery messages

Appendix R of the MIL STD 6016

Pointers- describes use of pointers

What JTIDS/MIDS terminal programming is contained within

1. Crypto:SDU


2. Terminal programming is the initialization data load, loaded from host system (JRE ADSI CDLMS)

What set time in an STRN and an ETRN?

1. STRN- NTR


2. ETRN- GPS

In course sync, can all messages be received and transmitted?

1. No, only TX RTT


2. All received

When discussing synchronization for primary users, know what information is needed for a primary user to go from course sync to fine sync?

1. Normal


2. Passive


3. ETRN

What is RELNAV based on?

1. RELGRID and GEOGRID


2. based on the time of arrival of PPLI message from at least 3 jus

What are the 3 roles associated with RELGRID associations?

1. Position reference


2. Primary navigation controller


3. Secondary navagation controller

Position reference

1. Optional


2. Position quality of 15, must be stationary

Primary navagation controller

1. Required for RELGRID


2. Defines origin, orientation


3. Relies of positions of higher PQ units, but determines exactly where grid origin is

Secondary navagation controller

1. Optional


2. Calculates position ONLY from PNC

What document is needed for network operations to extract necessary info regarding network entry and exit procedures?

1. OPTASKLINK

Understand the different data rates associated with JREAP A communication.

1. Half duplex


2. Normally 2400 bps. Capable of 2400, 4800, 9600.


1. 9600 only used for non-Dana satallites.


2. Satellite controller limits speed by assignment.

What is the difference between JREAP A B and C.

1. A- satellite


2. B- serial


-landline, SHR, EHF


-full duplex


-encrypted


-300- 115200 bps


3. C.IP


-CAT 5, WAN, LAN


- TCP, UDP


-IPV4 IPv6


-Encrypted


-data rate depends on bandwidth available