Defense Switched Network
   HOME
*





Defense Switched Network
The Defense Switched Network (DSN) is a primary information transfer network for the Defense Information Systems Network (DISN) of the United States Department of Defense. The DSN provides the worldwide non-secure voice, secure voice, data, facsimile, and video teleconferencing services for DOD Command and Control (C2) elements, their supporting activities engaged in logistics, personnel, engineering, and intelligence, as well as other Federal agencies. In 1982, the DSN was designated by the Office of the Secretary of Defense (OSD) and the Joint Chiefs of Staff (JCS) as the provider of long-distance communications service for the DOD. The DSN is designated as a primary system of communication during peacetime, periods of crisis, preattack, non-nuclear, and post-attack phases of war. The network assures nonblocking service for users with "flash" and "flash override" precedence capabilities. Key users include the National Command Authorities, Commanders of the Combatant Comman ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Telecommunications Network
A telecommunications network is a group of nodes interconnected by telecommunications links that are used to exchange messages between the nodes. The links may use a variety of technologies based on the methodologies of circuit switching, message switching, or packet switching, to pass messages and signals. Multiple nodes may cooperate to pass the message from an originating node to the destination node, via multiple network hops. For this routing function, each node in the network is assigned a network address for identification and locating it on the network. The collection of addresses in the network is called the address space of the network. Examples of telecommunications networks include computer networks, the Internet, the public switched telephone network (PSTN), the global Telex network, the aeronautical ACARS network, and the wireless radio networks of cell phone telecommunication providers. Network structure In general, every telecommunications network conceptually ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Network Administrator
A network administrator is a person designated in an organization whose responsibility includes maintaining computer infrastructures with emphasis on local area networks (LANs) up to wide area networks (WANs). Responsibilities may vary between organizations, but installing new Computer hardware, hardware, on-site servers, enforcing licensing agreements, software-network interactions as well as network integrity and resilience are some of the key areas of focus. Duties The role of the network administrator can vary significantly depending on an organization's size, location, and socioeconomic considerations. Some organizations work on a user-to-technical support ratio, Network administrators are often involved in proactive work. This type of work will often include: * network monitoring. * penetration test, testing the network for weakness. * keeping an eye out for needed updates. * installing and implementing security programs. * in many cases, E-mail and Internet filters. * eva ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

NORTHCOM
United States Northern Command (USNORTHCOM) is one of eleven unified combatant commands of the United States Department of Defense. The command is tasked with providing military support for non-military authorities in the U.S., and protecting the territory and national interests of the United States within the continental United States, Puerto Rico, Canada, Mexico, The Bahamas, and the air, land and sea approaches to these areas. It is the U.S. military command which, if applicable, would be the primary defender against an invasion of the U.S. USNORTHCOM was created on 25 April 2002 when President George W. Bush approved a new Unified Command Plan, following the September 11 attacks. USNORTHCOM went operational on 1 October 2002. Creation USNORTHCOM was established on 25 April 2002 when President George W. Bush approved a new Unified Command Plan, and attained initial operating capability on 1 October 2002. Mission According to the UCP, Northern Command's mission is to: ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Continental United States
The contiguous United States (officially the conterminous United States) consists of the 48 adjoining U.S. states and the Federal District of the United States of America. The term excludes the only two non-contiguous states, Alaska and Hawaii (also the last ones admitted to the Union), and all other offshore insular areas, such as American Samoa, Guam, the Northern Mariana Islands, Puerto Rico, and the U.S. Virgin Islands. The colloquial term "Lower48" is used also, especially in relation to just Alaska (Hawaii is farther south). The related but distinct term continental United States includes Alaska (which is also on the continent of North America but separated from the 48 states by British Columbia and Yukon of Canada), but excludes the Hawaiian Islands and all U.S. territories in the Caribbean and the Pacific. The greatest distance (on a great-circle route) entirely within the contiguous U.S. is 2,802 miles (4,509 km), between Florida and the State of Washington; th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

AFRICOM
The United States Africa Command (USAFRICOM, U.S. AFRICOM, and AFRICOM), is one of the eleven unified combatant commands of the United States Department of Defense, headquartered at Kelley Barracks, Stuttgart, Germany. It is responsible for U.S. military operations, including fighting regional conflicts and maintaining military relations with 53 African nations. Its area of responsibility covers all of Africa except Egypt, which is within the area of responsibility of the United States Central Command. U.S. AFRICOM headquarters operating budget was $276 million in fiscal year 2012. The Commander of U.S. AFRICOM reports to the Secretary of Defense. The current Commander of the U.S. Africa Command stated that the purpose of the command is to work alongside African military personnel to support their military operations. In individual countries, U.S. ambassadors continue to be the primary diplomatic representative for relations with host nations. The incumbent commander is Mi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Area Codes
A telephone numbering plan is a type of numbering scheme used in telecommunication to assign telephone numbers to subscriber telephones or other telephony endpoints. Telephone numbers are the addresses of participants in a telephone network, reachable by a system of destination code routing. Telephone numbering plans are defined in each of the administrative regions of the public switched telephone network (PSTN) and in private telephone networks. For public numbering systems, geographic location typically plays a role in the sequence of numbers assigned to each telephone subscriber. Many numbering plan administrators subdivide their territory of service into geographic regions designated by a prefix, often called an area code or city code, which is a set of digits forming the most-significant part of the dialing sequence to reach a telephone subscriber. Numbering plans may follow a variety of design strategies which have often arisen from the historical evolution of individual ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Government Emergency Telephone System
The Government Emergency Telecommunications Service (GETS) is a White House-directed emergency telephone service provided by a division of the Department of Homeland Security. GETS uses enhancements based on existing commercial technology Purpose GETS supports federal, state, local, and tribal government, industry, and non-governmental organization personnel during crisis or emergencies by providing emergency access and priority processing for local and long-distance telephone calls on the public switched telephone network. GETS is intended to be used in an emergency or crisis situation when the public switched telephone network is congested and the probability of completing a call over normal or other alternate telecommunication means is reduced. GETS is necessary because reliance on telecommunications has been accompanied by an increased vulnerability to network congestion and system failures. Although backup systems are in place, disruptions in service can still occur. Nat ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

SIPRNet
The Secure Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the 'completely secure' environment". It also provides services such as hypertext document access and electronic mail. As such, SIPRNet is the DoD's classified version of the civilian Internet. SIPRNet is the SECRET component of the Defense Information Systems Network. Other components handle communications with other security needs, such as the NIPRNet, which is used for nonsecure communications, and the Joint Worldwide Intelligence Communications System (JWICS), which is used for Top Secret communications. Access According to the U.S. Department of State Web Development Handbook, domain structure and naming conventions are the same as for the open internet, except for the addition of a second ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


NIPRNet
The Non-classified Internet Protocol (IP) Router Network (NIPRNet) is an IP network used to exchange unclassified information, including information subject to controls on distribution, among the private network's users. The NIPRNet also provides its users access to the Internet. It is one of the United States Department of Defense's three main networks. The others include SIPRNet and JWICS. History NIPRNet is composed of Internet Protocol routers owned by the United States Department of Defense (DOD). It was created in the 1980s and managed by the Defense Information Systems Agency (DISA) to supersede the earlier MILNET. Security improvements In the year leading up to 2010 NIPRNet has grown faster than the U.S. Department of Defense can monitor. DoD spent $10 million in 2010 to map out the current state of the NIPRNet, in an effort to analyze its expansion, and identify unauthorized users, who are suspected to have quietly joined the network. The NIPRNet survey, which use ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Internet Protocol
The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information. IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, which was complemented by a connection-oriented service that became the basis for the Transmission Control Protocol (TCP). The Internet protocol suite is therefore often referred to as ''TCP/IP''. The first major version of IP, Internet Protocol Version 4 (IPv4), is the do ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Defense Red Switch Network
The Defense Red Switch Network (DRSN) is a dedicated telephone network which provides global secure communication services for the command and control structure of the United States Armed Forces. The network is maintained by the Defense Information Systems Agency (DISA) and is secured for communications up to the level of Top Secret SCI. The DRSN provides multilevel secure voice and voice-conferencing capabilities to the National Command Authority (NCA, being the President and the Secretary of Defense of the United States), the Joint Chiefs of Staff, the National Military Command Center (NMCC), Combatant Commanders and their command centers, warfighters, other DoD agencies, government departments, and NATO allies. Department of Defense and federal government agencies can get access to the network with approval of the Joint Staff. Upon approval by the Joint Staff, DISA will work with the customer and the appropriate military department to arrange the service. The Defense Red Sw ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Secure Terminal Equipment
Secure Terminal Equipment (STE) is the U.S. government's current (), encrypted telephone communications system for wired or "landline" communications. STE is designed to use ISDN telephone lines which offer higher speeds of up to 128 kbit/s and are all digital. The greater bandwidth allows higher quality voice and can also be utilized for data and fax transmission through a built-in RS-232 port. STE is intended to replace the older STU-III office system and the KY-68 tactical system. STE sets are backwards compatible with STU-III phones, but not with KY-68 sets. STE sets look like ordinary high-end office desk telephones and can place unsecured calls to anywhere on the public switched telephone network (PSTN), as well as secured calls on it via the phone's backwards compatible STU-III mode. There is a PC Card slot in the STE that allows a Fortezza Plus (KOV-14) Crypto Card or KSV-21 Enhanced Crypto Card to be inserted. When an NSA configured Crypto Card is present, secure c ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]