1/50
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Signal Processing
Manipulating signals to enhance their quality, extract useful information, or prepare them for transmission.
Decryption
Converts ciphertext back into readable plaintext so authorized users can access the original information.
Routing
NL determines the best path for data across a network, similar to a navigation system, using routing protocols to deliver packets efficiently.
Logical Addressing
NL uses IP addresses to uniquely identify devices on a network, allowing the network layer to deliver data to the correct recipient.
Packet Delivery
NL breaks down messages into smaller packts for transmission and ensure reliable arrival. Sequence packets and checks for errors to fuarantee data integrity.
Connecting Networks
NL enables communication between different networks. Routing and addressing to connect separate networks.
Functions of NL
Routing, Logical Addressing, Packet Delivery, Connecting Networks
Three fundamentals for signal processing
Filtering, Amplification, Modulation.
Filtering
Remove unwanted signal components to isolate useful information.
Amplitude Modulation (AM)
Process of varying the amplitude of a carrier signal in proportion to a modulating signal while keeping the frequency constant. More susceptible to noise.
Frequency Modulation (FM)
Process of varying the frequency of the carrier signal in proportion to the modulating signal while keeping amplitude constant. It is more resistant to noise and interference but requires a larger bandwidth.
Transmitter
Converts information into a signal suitable for transmission.
Stages of Transmit Operations
Modulation, Amplification, Transmission.
Stages of Receiver Operations
Reception, Demodulation, Decryption.
Session Layer
Manage and control dialogues (sessions) between computers. Establish, maintain and terminate communication sessions. Ensure data exchange is properly coordinated.
COMSEC
Protects sensitive information; includes Confidentiality, Integrity, Authenticity, and Non-repudiation.
Encryption
Process of converting plaintext into ciphertext using a cryptographic algorithm and a key.
Key management
Process and protocols for handling cryptographic keys securely.
NETSEC (Network Security)
Involves securing communication networks against unauthorized access and misuse.
Modulation
Process of varying properties of a periodic wave form to encode information.
OSI model
A framework for understanding network interactions; layers include Physical, Data Link, Network, Transport, Session, Presentation, Application.
Physical Layer
Foundation of communication process in a network, responsible for the raw data transmission.
Network Layer
Responsible for delivery of packets across networks through logical addressing and routing.
Transport Layer
Ensures reliable data transfer with connection management, error recovery, and flow control.
Switching
Forwarding data packets to the appropriate destination within a network.
Dynamic Routing
Adaptive routing that adjusts automatically based on network topology changes.
Advantages of Dynamic Routing
Easy to configure and effective for route selection/discovery.
Disadvantages of Dynamic Routing
Consumes more bandwidth and is less secure than static routing.
Subnet
Process of splitting a larger network into smaller pieces.
CIDR notation
Makes addressing more flexible using a slash and a number instead of fixed classes.
Troubleshooting
Process of diagnosing and identifying problems within a hardware or software device.
Two types of Ethernet cables
T568A and T568B.
Differences between T568A and T568B
Wire positioning, usage and standards, functionality.
Frequency range of AN/PRC - 117G
Operates across VHF, UHF, and L-band frequencies.
Capabilities of AN/PRC - 117G
Provides secure voice and data communication, incorporates GPS.
Applications of AN/PRC - 117G
Used by ground forces for tactical communication.
Propagation
Sky waves bounce off the ionosphere to allow long-distance communication.
Polarization
Orientation of a radio wave, requiring alignment of transmitting and receiving devices.
Electromagnetic Interference
Noise and interference in crowded environments can degrade radio signals.
Lower Tier
Operates transparently in the background, handling tasks like framing, error detection, and physical transmission of data. It requires no active management from users or applications.
Power capacity of OE - 254
350 Watts of RF power.
Durability of OE - 254
Can withstand 90 MPH without ice and 60 MPH with 0.5 in of ice.
Portability of OE - 254
Suitable for various terrains or climates.
Satellite Access Authorization (SAA)
Allows for secure satellite communication for military bases.
Satellite
Space-based repeater for signals, amplifies and retransmits them.
Uplink
Transmission of signals from ground stations to satellites.
Downlink
Reception of signals transmitted from satellites back to earth.
Demodulation
Extracting original information from a modulated carrier wave.
Benefits for making data tidy
Simplifies analysis, reduces errors, enhances reproducibility.
SMART goal
Specific, Measurable, Action Oriented, Relevant, Timebound.
Storytelling in Data
Uses data as a foundation, with narrative to humanize insights and visualization to simplify explanations.