4 Knowledge Base

 

 TelecomTrainning.net > Knowledge Base
 Viewing KB Article
Good Evening, - Please register or - log-in to your account.
Search
Search   Saved Questions   Ask a question
Keywords 
 
Available categories
LTE
100 of Questions in LTE
CCNA Certification
CCNA Sample Q & A (1000 + Q &A)
(Network +) Certification
(Network +) Sample Q & A (1000 + Q &A)
Networking
General/Interview Q& A on Networking
Home Networking
General/Interview Q& A on Networking
VOIP, SIP & Asterisk
Q & A on VOIP,Ethereal, SIP & Asterisk
Telecom Test Equipments
Q & A on Telecom Test Equipment
PSTN / Wireline
General / Interview Q & A on PSTN / Wireline
LTE, Wireless, 3G ,Diameter and HSS
General/Interview Q & A on LTE, Wireless, 3G ,Diameter and HSS
Telecom General
Any Q & A in Telecom in General

Top Questions
Friends, Describe Secure storage and distribution of A-Keys?
what is the difference between E1 signal & Ethernet signal ?
How do I monitor SS7 Traffic in spectra2?
Can you tell me about PBGT?
Explain me the difference between a repeater, bridge and router? Relate this to the OSI model.
What is the difference between BRI & PRI ?
Guys what is the purpose of Umbrella Cell Approach in GSM ?
how can we explain media gateway in MSc?
What is GGSN?
What is the difference between Electrical-tilt and Mechanical-tilt of an antenna?
What is BSC?
What is demarc point?
Can any one explain me how sms flow will work using ss7 network ?( from physical layer to application layer)
why cellphone towers are painted in red and white?
Explain SLTA and SLTM messages in MTP3?
Hi guys what is WAP?
wat is the difference betweem MSC & GMSC, & MSS & GCS?
what is EDAp? what is the functions of EDAP?
What is a circuit id?
what is sdh?

I need help; what is NMS?
Matthew 03-October-2007 06:32:22 PM

Comments


NMS is basically network management system in which all the management work is perform as well as well as it control and monitor the network.
Posted by sagitraz


The National Military Strategy (of the United States) (NMS) is issued by the Chairman of the Joint Chiefs of Staff as a deliverable to the Secretary of Defense briefly outlining the strategic aims of the armed services. The NMS's chief source of guidance is the National Security Strategy document.

The Chairman of the Joint Chiefs of Staff (CJCS), in consultation with the other members of the Joint Chiefs of Staff (JCS), the Commanders of the Unified Combatant Commands (CoComs), the Joint Staff and the Office of the Secretary of Defense (OSD), prepares the National Military Strategy in accordance with 10 U.S.C., Section 153. Title 10 requires that not later than February 15 of each even-numbered year, the Chairman submit to the Senate Committee on Armed Services and the House Committee on Armed Services a comprehensive examination of the national military strategy. This report must delineate a national military strategy consistent with the most recent National Security Strategy prescribed by the President; the most recent annual report of the Secretary of Defense submitted to the President and Congress; and the most recent Quadrennial Defense Review conducted by the Secretary of Defense,

The NMS Report must provide a description of the strategic environment and the opportunities and challenges that affect United States national interests and United States national security. The Report must describe the most significant regional threats to US national interests and security as well as the international threats posed by terrorism, weapons of mass destruction, and asymmetric challenges.

After describing the security environment in which military forces will operate, the NMS Report must specify the “ends”, “ways”, and “means” of the strategy. US national military objectives are the “ends”, describing what the Armed Forces are expected to accomplish. The NMS report describes the relationship of those objectives to the strategic environment, regional, and international threats. Strategic and operational concepts are the “ways” of the strategy and describe how the Armed Forces conduct military operations to accomplish the specified military objectives. Finally, the NMS report must describe the adequacy of capabilities—the “means”—required to achieve objectives within an acceptable level of military and strategic risk.

Military action, by itself, cannot fully accomplish the objectives specified in the President’s National Security Strategy. The NMS must account for the contribution of allies and other partners. Military capabilities are always employed as part of an integrated national approach that employs all instruments of national power—military, information, diplomatic, legal, intelligence, finance, and economic. The NMS Report must assess the capabilities, adequacy, and interoperability of regional allies of the United States and or other friendly nations to support US forces in combat operations and other operations for extended periods of time.

The NMS Report also includes an assessment of the nature and magnitude of the strategic and military risks associated with successfully executing the missions called for under the strategy. In preparing the assessment of risk, CJCS examines assumptions pertaining to the readiness of forces (in both the active and reserve components), the length of conflict and the level of intensity of combat operations, and the levels of support from allies and other friendly nations.

Before submitting the report to Congress, the Chairman provides a copy to the Secretary of Defense. The Secretary provides an assessment and comments on the report and submits these comments to Congress when the report is formally transmitted. Specifically, the Secretary of Defense must examine areas of risk considered “significant” by the Chairman and provide a plan for mitigating those risks.
Posted by waqasahmad


NMS is basically network management system in which all the management work is perform as well as well as it control and monitor the network.
Posted by HamidAliKhan


Network management system. Provides bit-level metrics and network utilization, error rates, bottlenecks, security breeches, faults, and faulty packets.
Posted by elie

Q&A Rating

Q&A Rating
Rate This Question and Answer

Related Questions
what’s the important features of stub area?
 
In Unix, how do I change the permissions of a file?
 
I need help; what is the command syntax to set a gateway of last resort in your Cisco router?


Search questions via popularity
Top viewed questions  Top emailed questions  Most printed questions  Most saved questions
 
Copyright © Telecom Training, All Rights Reserved