Global Information Lookup Global Information

Defense Information System Network information


The Defense Information System Network (DISN) has been the United States Department of Defense's enterprise telecommunications network for providing data, video, and voice services for 40 years.[1]

The DISN end-to-end infrastructure is composed of three major segments:

  • The sustaining base (I.e., base, post, camp, or station, and Service enterprise networks). The Command, Control, Communications, Computers and Intelligence (C4I) infrastructure will interface with the long-haul network to support the deployed warfighter. The sustaining base segment is primarily the responsibility of the individual Services.
  • The long-haul transport infrastructure, which includes the communication systems and services between the fixed environments and the deployed Joint Task Force (JTF) and/or Coalition Task Force (CTF) warfighter. The long-haul telecommunications infrastructure segment is primarily the responsibility of DISA.
  • The deployed warfighter, mobile users, and associated Combatant Commander telecommunications infrastructures are supporting the Joint Task Force (JTF) and/or Coalition Task Force (CTF). The deployed warfighter and associated Combatant Commander telecommunications infrastructure is primarily the responsibility of the individual Services.[2]

The DISN provides the following multiple networking services:

  • Global Content Delivery System (GCDS)
  • Data Services
    • Sensitive but Unclassified (NIPRNet)
    • Secret Data Services (SIPRNet)
    • Multicast
  • Organizational Messaging

The Organizational Messaging Service provides a range of assured services to the customer community that includes the military services, DoD agencies, combatant commands (CCMDs), non-DoD U.S. government activities, and the Intelligence Community (IC). These services include the ability to exchange official information between military organizations and to support interoperability with allied nations, non-DoD activities, and the IC operating in both the strategic/fixed-base and the tactical/deployed environments. Organizational Messaging supports the assured secure delivery of organizational messages within strict service parameters. This includes delivery times of three minutes or less for high precedence (flash and above) messages across the DISA-provided infrastructure. Additionally, information confidentiality and integrity are guaranteed through the use of NSA-approved Fortezza-based encryption and signature between the Automated Message Handling Systems (AMHSs) operated/maintained by the Services/agencies/COCOMs.

  • Satellite
    • Commercial Satellite (COMSATCOM)
    • Distributed Tactical Communications System (DTCS)
    • International Maritime Satellite (INMARSAT)
    • Joint Internet Protocol Modem (JIPM)
  • Transport

Dedicated service is a private-line-transport service that provides point-to-point connectivity to mission partner locations. DISA mission partners require dedicated point-to-point layer 1 and layer 2 circuits because of the inherent simplicity and security. To satisfy this demand, Dedicated services are currently offered and are available in a variety of bit rates and interfaces.

  • Voice
    • Multilevel Secure Voice (DRSN)
    • SBU Voice (VoIP and DSN)
    • TS/SCI Voice (JWICS)
    • Voice ISP-PSTN
    • Voice over Secure IP (VoSIP)
    • Enterprise Classified Voice over Internet Protocol (ECVoIP)
    • Enterprise Voice over Internet Protocol (EVoIP)

The technical core of the DISN is provided by the capabilities built by DISA from 2002–2006 called the Global Information Grid-Bandwidth Expansion (GIG-BE). This program remains to this day the core of the services provided by DISA to serve the United States. As one of few on time, within budget, to required performance standard DoD ACAT 1AM programs, GIG-BE shows how a government integrated, contractor assisted acquisition can achieve transformational results. The $877 million programs was the largest DoD information technology transport structure ever built. GIG-BE created a ubiquitous "bandwidth-available" environment to improve national security intelligence, surveillance, reconnaissance, information assurance, and command and control at locations worldwide. After extensive component integration and operational testing, implementation began in early 2004 and extended through 2005. GIG-BE achieved initial operational capability (IOC) at six sites 30 Sept. 2004. On 20 Dec. 2005, the GIG-BE program achieved the milestone of full operational capability at all of the almost 100 Joint Staff approved sites.[3]

  1. ^ "DISA Subscription Service for the 21st Century". DISA.
  2. ^ DISN Data Services Course, Module 1 - DISN Data Networks Overview, 01SEP09
  3. ^ "DISA - Our History, 2000s".

and 24 Related for: Defense Information System Network information

Request time (Page generated in 0.9362 seconds.)

Defense Information System Network

Last Update:

The Defense Information System Network (DISN) has been the United States Department of Defense's enterprise telecommunications network for providing data...

Word Count : 751

Defense Information Systems Agency

Last Update:

The Defense Information Systems Agency (DISA), known as the Defense Communications Agency (DCA) until 1991, is a United States Department of Defense (DoD)...

Word Count : 3679

Defense Switched Network

Last Update:

The Defense Switched Network (DSN) is a primary information transfer network for the Defense Information Systems Network (DISN) of the United States Department...

Word Count : 450

Defense Data Network

Last Update:

Autonomous System numbers. Defense Information Systems Network (DISN) John Pike, Maintained by Steven Aftergood (February 11, 2000). "Defense Data Network (DDN)...

Word Count : 733

SIPRNet

Last Update:

Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department...

Word Count : 527

Assistant Secretary of Defense for Networks and Information Integration

Last Update:

of Defense for Networks & Information Integration (ASD(NII)) was an appointed position that provided management and oversight of all DoD information technology...

Word Count : 1207

Defense Technical Information Center

Last Update:

and Information Systems, Defense Systems, and Homeland Defense and Security. The BCO's rely on their extensive Subject Matter Expert (SME) network; which...

Word Count : 692

General Dynamics Mission Systems

Last Update:

communication and information systems and technology. General Dynamics Mission Systems has core manufacturing in secure communications networks; radios and...

Word Count : 1198

Joint Worldwide Intelligence Communications System

Last Update:

sensitive compartmented information. JWICS superseded the earlier DSNET2 and DSNET3, the Top Secret and SCI levels of the Defense Data Network based on ARPANET...

Word Count : 2536

Systems integrator

Last Update:

but the term is generally used in the information technology (IT) field such as computer networking, the defense industry, the mass media, enterprise application...

Word Count : 1122

Defense Red Switch Network

Last Update:

structure of the United States Armed Forces. The network is maintained by the Defense Information Systems Agency (DISA) and is secured for communications...

Word Count : 389

Information operations condition

Last Update:

(short for information operations condition) is a threat level system in the United States similar to that of FPCON. It is a defense system based primarily...

Word Count : 343

Host Based Security System

Last Update:

and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer Network Defense Solutions Steering Group (ESSG)...

Word Count : 1702

Computer network

Last Update:

Standard for Information Technology--Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks--Specific Requirements...

Word Count : 9862

Geographic information system

Last Update:

A geographic information system (GIS) consists of integrated computer hardware and software that store, manage, analyze, edit, output, and visualize geographic...

Word Count : 13053

Defense Message System

Last Update:

Handling System), MMHS, and CMS 1.0. Defense Switched Network GOSIP Defense Message System at Defense Information Systems Agency Defense Messaging System at...

Word Count : 338

Medium Extended Air Defense System

Last Update:

Medium Extended Air Defense System (MEADS) is a ground-mobile air and missile defense system intended to replace the Patriot missile system through a NATO-managed...

Word Count : 3127

Immune system

Last Update:

The immune system is a network of biological systems that protects an organism from diseases. It detects and responds to a wide variety of pathogens,...

Word Count : 13493

Certified information systems security professional

Last Update:

approved by the U.S. Department of Defense (DoD) in their Information Assurance Technical (IAT), Managerial (IAM), and System Architect and Engineer (IASAE)...

Word Count : 1999

Defense Visual Information Distribution Service

Last Update:

The Defense Visual Information Distribution Service (DVIDS), formerly the Defense Video & Imagery Distribution System, is an operation supported by the...

Word Count : 284

Aegis Combat System

Last Update:

operators). Aegis BMD (Ballistic Missile Defense) capabilities are being developed as part of the NATO missile defense system. The word "Aegis" is a reference...

Word Count : 5010

NIPRNet

Last Update:

Defense (DOD). It was created in the 1980s and managed by the Defense Information Systems Agency (DISA) to supersede the earlier MILNET. In the year leading...

Word Count : 400

Information warfare

Last Update:

cyberwarfare, information assurance and computer network operations, attack, and defense. Other militaries use the much broader term information operations...

Word Count : 3437

Security hacker

Last Update:

someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of...

Word Count : 5735

PDF Search Engine © AllGlobal.net