Service Definition

Core Services

As part of ITA’s mission in providing a wide range of converged technology products, services and solutions tailored to meet its customers’ mission requirements, ITA serves as an honest broker of Telephone Service by managing multiple contracts to ensure customers receive the best level of service and prices.

ITA provides its customers with both functional and domain expertise. The organization provides a wealth of technical knowledge related to telecommunications services and equipment and has extensive knowledge of the personal and unique requirements of the DoD customer base. ITA helps DoD agencies with the provisioning, troubleshooting and management of telecommunications products and services.

ITA provides various Telephone Services capabilities to its customers via an integrated network, as well as many support services to ensure service quality and customer satisfaction.

Local Voice Services

ITA provides its Local Voice Services to DoD agencies located in the National Capitol Region (NCR). Customers can leverage Verizon’s Integrated Services Digital Network (ISDN) and Legacy Analog Networks.

Integrating with Centrex, a type of telephone exchange, gives additional power to voice systems and improves productivity. The integration also allows the customer to allocate bandwidth across desktops and take advantage of the classic benefit of Centrex with the enhanced call handling features of ISDN.

Services Included with Local Voice Services

ITA provides the following services to customers receiving local voice services:

  • DSN
    • ­The Defense Switched Network (DSN) is a worldwide private-line telephone network that provides global voice services via the Defense Information System Network (DISN). DSN provides command and control users the ability to achieve the highest priority call connection, especially during crisis situations. The DSN also provides global data and video services using dial-up switched 56 kbps or 64 kbps Integrated Services Digital Network (ISDN). Users of DSN can leverage secure voice communications using end-to-end encrypted equipment. DSN is authorized for Military Services and Agencies within the DoD, all other federal agencies, DoD contractors and Allies, must be authorized by the Joint Staff (in accordance with CJCSI 6215.01).
    • ITA provides DSN access for customers through the sixteen DoD Network Switches and customer-owned Private Branch Exchanges (PBX). Questions regarding DSN may be directed to the Consolidated Customer Service Center (CCSC) at 703-697-2193.

     DOD NETWORK SWITCHESCOM NNX CODESDSN NNX CODES
    1.Arlington696
    588
    426
    425
    2.Barcroft681
    882
    761
    381
    3.Beltsville394290
    4.Burgundy Rd325
    428
    221
    328
    5.Cameron617767
    6.Congress Heights767
    201
    404
    297
    831
    754
    7.Crystal City601
    602
    604
    607
    699
    329
    332
    664
    327
    499
    8.Downtown761763
    9.Georgia Ave782
    356
    662
    642
    10.Herndon735653
    11.Lewinsville285
    275
    356
    235
    12.Midtown762762
    13.Pentagon692
    693
    614
    695
    571
    697
    222
    223
    224
    225
    671
    227
    14.Southeast433
    685
    284
    781
    288
    325
    484
    326
    15.Wildwood295
    319
    295
    285
    16.Woodacres227287
    17.Woodley764764

  • Project Management

    • ITA works with individual customers to craft the optimal telecommunications solution – helping each one acquire the best products and services at the best price. ITA manages large and small telecommunications projects through major industry vendor contracts and provides expertise in price evaluation and negotiation, service delivery and implementation.
    • ITA’s team of certified Project Managers provides a full suite of services through the stages of analysis, requirements development, design, implementation, operations, and training. After the technical solution is finalized, ITA is available throughout the life of the project to assist with ordering, installation, testing and acceptance, and the final billing stages-ensuring the project is managed to the customer’s satisfaction. Project Support areas include: technical project management support, outside cable installations, large and small moves, business case analysis, feasibility studies, billing consulting, contractual oversight, vendor management, Joint Interoperability Test Command (JITC) certification support, Continuity of Operations (COOP) Disaster recovery, and Base Realignment and Closure (BRAC) Support Services. Project deliverables include: requirements analysis, statements of work, work breakdown structures, project charters, contract analysis, price quotes, cost estimates, and project schedules.
  • ITA Audio Conferencing

    • Audio Conferencing Services allow participants at multiple locations to participate in meetings using multi-point teleconferencing arrangements and their own telephone equipment. Through audio teleconferencing, government agencies are able to address issues quickly, and involve more people in discussions and decisions.
    • To schedule an audio conference: Contact the Conference Call Coordinator by:
      • Dialing (703) 614-3869 or pressing “0” on a DoD telephone and asking the operator to connect you to the Conference Call Coordinator
      • Provide the Coordinator, the name and phone of the DoD employee hosting the conference
      • Provide the Coordinator the date, time, number of participants, and duration of the conference
      • It is recommended that conference calls are scheduled at least one day in advance as it is first-come, first-serve
      • The Conference Call Coordinator is available Monday thru Friday, 0700 to 1730 (except federal holidays)
    • On the day of the conference, all participants will dial-in using 703-695-4042 or DSN 225-4042 and enter the assigned pass code (provided by the Conference Call Coordinator
  • Telecommunications Audit Service

    • ITA offers Telecommunications Audit Service at no charge to provide customers with an accurate assessment of their current telecommunications assets. The service includes a physical audit to quantify and verify the number of Telephone Services which can reduce and eliminate unused dial tone lines, equipment, and features. A wireless audit of devices and plans is also available for customers who utilize these services. An audit should be done to reduce telecommunications costs, improve services management, and alleviate telephone fraud and abuse.
  • Elective Services

    • ITA offers the following elective services in addition to its Local Voice Services
  • Voicemail

    • Voicemail Service provides customers the ability to use the Voicemail feature of the WITS 3 Network by leasing individual mailboxes on a monthly basis. WITS 3 Voicemail Service allows users to tailor individual announcements to alert callers when they are not available to answer their phone. Voicemail allows callers to leave a detailed 90-second message to inform the user of the information that is required by the caller, which increases productivity and eliminates “telephone tag.” The service is accessible from any telephone with a standard push button tone pad.
  • Audio Conferencing
    • Customers may purchase Audio Teleconferencing Services (ATS) that allow participants at multiple locations to conduct interactive dialogues and meetings using multi-point teleconferencing arrangements and their own telephone equipment. Through audio teleconferencing, government agencies are able to address issues quickly, involve more people in discussions and decisions, and promote a collaborative team environment. For more information on purchasing ATS, contact the Consolidated Customer Service Center (CCSC) at 703-697-2193.
  • Long Distance Voice Services­
    • ITA provides long-distance calling, as a part of the comprehensive digital and integrated network. Long distance service must be accompanied by local calling service described above. Long Distance Services are provided by ITA through the GSA Networx contract.
  • Toll-Free Service­
    • ITA provides Domestic (CONUS) and International (OCONUS) Inbound Toll-Free Service. To establish service, contact the Consolidated Customer Service Center (CCSC) at 703-697-2193.
  • Calling Cards
    • Calling cards are available for issue to customers with active Billing Account Codes (BAC). Customers can use the card in 240 countries worldwide and in all CONUS locations. For more information, contact the Consolidated Customer Service Center (CCSC) at 703-697-2193.
Print
A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

ABack to Top

Access Control List (ACL)

A table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its ACL.

Air Blown Fiber (ABF)

A scalable, easily configured fiber optic infrastructure that allows fiber to be blown through cabling pipes from one location to another. This system enables installers to update fiber in a matter of moments instead of hours or days.

BBack to Top

Billing Account Code (BAC)

A code assigned to customers to facilitate the billing process for telephonic services.


Blanket Purchase Agreement (BPA)

Contracting vehicles that enable agencies to obtain services using a single pricing structure, thereby simplifying the billing process and reducing the number of contracts.

Bridge

A bridge connects equipment at various locations, with various speeds and with various protocols – via a digital network. ITA’s video teleconferencing bridges provide a conduit to Defense Video Services-Global (DVS-G) for customer sites that do not have a requisite site ID.

CBack to Top

Cold Transfer

A phone call that comes in without any warning or explanation from the person who transferred the call. In the context of a service call, this means that a customer is transferred to a higher service tier without any interaction or transfer of information between the current tier and the next highest tier.

Commercial Off-the-Shelf (COTS)

Software or hardware products that are ready-made and available for sale to the general public. COTS products are designed to be easily implemented into existing systems without the need for customization.

Common Information Technology (CIT)

A range of services typically provided by an IT service supplier to multiple organizations and customers. CIT includes Operation and Maintenance, technical upgrade, engineering, integration, architecture, and information assurance of the infrastructure needed to provide the services.

Computer Network Defense Service Provider (CNDSP)

Computer Network Defense is used to describe the actions taken (within the DoD) to protect, monitor, analyze, detect, and respond to unauthorized activity within DoD information systems and computer networks. The CND service providers are those entities providing these services.

Connection Approval Package (CAP)

Package required to obtain access to the Pentagon Unclassified or Classified backbone network (upon approval). Once granted access, the customer must provide ITA with any significant changes that affect the accuracy of the customer’s CAP.

Continuity of Operations (COOP)

An organization’s ability to survive and sustain critical core business operations and functions during an unforeseen Enterprise interruption event.

Core Service

Standalone services offered by ITA to its customers. Core Services are enhanced by additional services that complement the Core Service. (These services are intrinsic to the Core Service and are provided to all subscribing customers.) Additionally, ITA may offer Elective Services to complement each Core Service.

Customer Account Manager (CAM)

An organization’s primary point of contact with it’s customers. CAMs resolve service-related issues and sign-up customers for new services.

DBack to Top

Defense Satellite Communications System (DSCS)

The workhorse of the U.S. Military’s super-high frequency communications. DSCS provides military communications to troops in the field as well as commanders at multiple locations. DSCS III, the most recent configuration, provides uninterrupted secure voice and high data rate communications to DoD users, essential tools in monitoring events, and deploying and sustaining forces anywhere in the world.

Defense Information Systems Agency (DISA)

A DoD combat support agency under the direction of the Assistant Secretary of Defense for Networks and Information Integration [ASD (NII)]. DISA is responsible for planning, engineering, acquiring, fielding and supporting global net-centric solutions and operating the Defense Information System Network (DISN) to serve the needs of the President, Vice President, Secretary of Defense, Joint Chiefs of Staff, Combatant Commanders and other DoD components under all conditions of peace and war.

Defense Information Systems Network (DISN)

DoD’s worldwide, common-user telecommunications network. DISN interfaces with customer-owned equipment to deliver secure and non-secure information from desktop to foxhole. DISN supports the Defense Message System (DMS) and Electronic Commerce/Electronic Data Interchange (EC/EDI).

Defense Switch Network (DSN)

A worldwide private-line telephone network. Multilevel precedence and preemption capabilities on the DSN utilized by Command and Control (C2) users ensure that the highest-priority calls achieve connection quickly, especially during a crisis situation. The DSN also provides global data and video services using dial-up switched 56 kbps or 64 kbps Integrated Services Digital Network (ISDN) services.

Delegated Approval Authority (DAA)

The official with the authority to formally assume responsibility for operating a system at an acceptable level of risk.

Demilitarized Zone (DMZ)

A firewall configuration for securing local area networks (LANs).

Department of Defense Information Assurance Certification and Accreditation Process (DIACAP)

A streamlined and modern certification and accreditation (C&A) process that complies with FISMA, is more compatible with DOD’s IA controls-based approach for information systems security, and lends itself to the use of evolving automated C&A tools.

EBack to Top

Elective Service

Optional services that enhance a given Core Service by adding features and/or increasing the capability of an existing service element.

Emergency Alert Services (EAS)

A system used by government to send alerts via broadcast stations and cable systems.

Enterprise Management System (EMS)

A Management System Platform that receives inputs from various, independent network and element management systems, and serves as a single monitoring point.

FBack to Top

Federal Telecommunications Systems contract (FTS2001)

A contractual vehicle that enables agencies to get worldwide telecommunications solutions, including voice, data, wireless, and video. Flexibility is built into FTS2001 to provide access to new technologies as they become available.

Fiber Channel

A technology for transmitting data between computer devices at data rates of up to 4 Gbps . A fiber channel is especially suited for connecting computer servers to shared storage devices and for interconnecting storage controllers and drives.

Fiber Channel Transport (FCT)

A high-speed transport technology used to build storage area networks (SANs). Although fiber channel can be used as a general-purpose network carrying ATM, IP and other protocols, it has primarily been used for transporting SCSI traffic from servers to disk arrays.

Fortezza Certificate

Fortezza is a set of security algorithms used by the U.S. government.

GBack to Top

Global Information Grid (GIG)

A net-centric system operating in a global context to provide processing, storage, management, and transport of information to support all DoD, national security, and related Intelligence Community missions and functions (strategic, operational, tactical, and business) in war, in crisis, and in peace.

HBack to Top

 I Back to Top

Information Assurance Vulnerabilities (IAV)

Computer application software or operating system vulnerabilities, determined by NetDefense or DoD-Cert, a division of the Global Network Operations Center, of the JTF-GNO. These selected vulnerabilities are the mandated baseline, or minimum configuration of all hosts residing on the GIG framework.

Information Assurance Vulnerability Alert (IAVA)

The comprehensive distribution process for notifying the Components about vulnerability alerts and countermeasures information.

Information Technology Infrastructure Library (ITIL)

A globally recognized collection of best practices for IT service management.

International Organization of Standards (ISO 9001-2000)

Specifies requirements for a Quality Management System overseeing the production of a product or service. It is not a standard for ensuring a product or service is of quality; rather, it attests to the process of production, and how it will be managed and reviewed.

Intrusion Detection System (IDS)

IDSs inspect all inbound and outbound network activity and identify suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.

Intrusion Prevention System (IPS)

An IPS keeps systems safe by identifying and blocking suspicious traffic.

JBack to Top

Joint Task Force-Global Network Operations (JTF-GNO)

Directs the operation and defense of the Global Information Grid (GIG) across strategic, operational, and tactical boundaries in support of the U.S. DoD’s full spectrum of war fighting, intelligence, and business operations.

Joint Worldwide Intelligence Communications System (JWICS)

A network designed to meet the requirements for secure (TS/SCI) multi-media intelligence communications worldwide. JWICS replaces the DDN DSNET3 as the Sensitive Compartmented Information (SCI) component of the Defense Information System Network (DISN).

LBack to Top

Lean Six Sigma

Lean Six Sigma combines the industry best practice principles of Lean manufacturing and Six Sigma. Six Sigma is a system of practices originally developed to systematically improve processes by eliminating defects. Lean is a generic process management philosophy renowned for its focus on reduction of waste in order to improve overall customer value.

Local Area Network (LAN)

A group of computers and associated devices that share a common communications line or wireless link. Typically, connected devices share the resources of a single processor or server within a small geographic area.

MBack to Top

Malware Behavioral Analysis

Malware Behavioral Analysis examines how the malicious programs interact with their environment: the file system, the registry (for Windows programs only), and the network.

Mean Opinion Score (MOS)

In voice communications, particularly Internet telephony, the mean opinion score provides a numerical measure of the quality of human speech at the destination end of the circuit.

Metropolitan Area Network (MAN)

A network that interconnects users with computer resources in a geographic area or region larger than that covered by a large local area network (LAN), but smaller than the area covered by a wide area network (WAN).

Move, Add, or Change (MAC)

The capability to move, add, or change a specific aspect of a service. (e.g. Moving a network port from one office to another)

NBack to Top

National Capital Region (NCR)

The District of Columbia; Montgomery, Prince George’s, and Frederick Counties in Maryland; Arlington, Fairfax, Loudon, and Prince William Counties in Virginia; and all cities within the outer boundaries of the combined area of the aforementioned counties. The NCR is defined in Executive Order 13150 (21 Apr 2000).

National Communications System (NCS)

The mission of the NCS is to assist the President, the National Security Council, the Homeland Security Council, the Office of Science and Technology Policy and the Office of Management and Budget in the coordination of planning for, and provisioning of, national security and emergency preparedness communications for the Federal Government (under all circumstances, including crisis or emergency, attack, recovery and reconstitution).

Network Access Point (NAP)

A major point of access to the internet.

Network Systems Management Center (NSMC)

A 24 x 7 service desk providing support to customers receiving Cable Television service.

Non-Global Information Gig Services (Non-GIG)

Circuit Transport Services provided by ITA (or locally procured by an organization) that are not considered part of DISA’s GIG. Non-GIG services provided by ITA ride over ITA’s managed backbone and other associated transport equipment.

OBack to Top

Operations and Maintenance (O&M)

The range of activities and services provided for the upkeep and preservation of the existing systems and facilities.

Operations Support

Operations-oriented service elements that are provided in support of (or as an enhancement to) each ITA customer’s IT service.

PBack to Top

Penetration Testing

Security-oriented probing of a computer system or network to seek out vulnerabilities that an attacker could exploit.

Pentagon Area

Includes the Pentagon and Swing Space.

Pentagon Computer Incident Response Team (PENTCIRT)

Assists with minimizing the consequences of computer incidents, including malicious logic, and facilitates the return of compromised network resources to acceptable levels of confidentiality, integrity, and availability.

Pentagon Renovation (PENREN)

A multi-year, multi-phased program to renovate the Pentagon building.

Pentagon Technical Control Facilities (PTCF)

Provides the U.S. Army with operation and maintenance services for Pentagon telecommunications circuits.

Protected Distribution System (PDS)

A wireline or fiber-optics telecommunication system that includes terminals and adequate acoustical, electrical, electromagnetic, and physical safeguards to permit its use for the unencrypted transmission of classified information.

RBack to Top

Redundant Array of Independent Disks (RAID)

A method for storing the same data in different places (thus, redundantly) on multiple hard disks. By placing data on multiple disks, input/output (I/O) operations can overlap in a balanced way, improving performance.

Remedy

An incident management ticketing system used to track reported issues from inception to resolution.

Remote Access Service (RAS)

Provides state-of-the-art remote access connectivity to Pentagon network resources via dial-up or broadband connections.

Resource Situational Awareness Center (RSAC)

Pentagon facility that provides for the collaboration of effort between the four services in supporting the joint staff and the service’s Title 10 function. RSAC integrates the operations and intelligence divisions of the four services within a single area to coordinate efforts and share information in the event of a crisis (to include tsunamis, hurricanes, and attacks against the United States and its allies).

Resumption Point Objective (RPO)

The maximum acceptable level of data loss following an unplanned “event”, like a disaster (natural or man-made), act of crime or terrorism, or any other business or technical disruption that could cause such data loss. The RPO represents the point in time, prior to such an event or incident, to which lost data can be recovered (given the most recent backup copy of the data).

Resumption Time Objective (RTO)

A period of time within which business and/or technology capabilities must be restored following an unplanned event or disaster.

Reverse Engineering

The process of discovering the technological principles of a device, object, or system through analysis of its structure, function and operation. Reverse engineering often involves taking something (e.g. a mechanical device, an electronic component, a software program) apart and analyzing its workings in detail, usually to try to make a new device or program that does the same thing without copying anything from the original.

SBack to Top

Sensitive but Unclassified (SBU)

A designation given to information that is generally restricted from public disclosure, but which is not classified.

Service Offering

A functional area of IT services that is comprised of interrelated Core Services, Elective Services and Operations Support. ITA has divided its Core Services into 13 Service Offerings.

Service Restoral

The mean time to restore service following system failures that result in a service outage. The time to restore includes all time from the occurrence of the failure until the restoral of service.

Storage Area Network (SAN)

A high-speed sub-network of shared storage devices. A storage device is a machine that contains nothing but a disk or disks for storing data

Strategic Command (STRATCOM)

Headquartered at Offutt Air Force Base, Nebraska, STRATCOM is one of nine U.S. unified commands under the DoD.

Swing Space

Temporary space provided by the Renovation Program (PENREN) for those displaced by the renovation effort. Swing Apace outside of the Pentagon includes: FOB2, Navy Annex, 1500 Wilson Blvd; 1777 N. Kent St. Rosslyn (Rosslyn Plaza North) and Presidential Towers in Crystal City

TBack to Top

Technical Analysis Cost Estimate (TACE)

An estimate outlining the costs associated with a project. TACEs typically exceed the parameters of a MAC.

Telecommunications Service Order (TSO)

The authorization from a DISA Allocation and Engineering (A&E) activity to start, change, or discontinue circuits, trunks, links, or systems; to amend previously issued TSOs; and to effect administrative changes. It is a document in most cases, although a verbal TSO may be issued.

Telecommunications Service Priority (TSP)

A Federal Communications Commission (FCC) program used to identify and prioritize telecommunications services that support National Security Emergency Preparedness (NS/EP) missions.

Tivoli Storage Manager (TSM)

A tool that automates data backup and restore functions, and centralizes storage management operations.

Type 1 Encryption Device

A Type 1 encryption device is a device or system certified by the National Security Agency (NSA) for use in cryptographically securing classified U.S. Government information.

UBack to Top

Uninterruptable Power Supply (UPS)

A power supply that includes a battery to maintain power in the event of a power outage.

 V Back to Top

Virtual Machine (Ware) (VM)

Used to partition x86-based workstations and servers into separate virtual machines, each containing its own copy of the OS. Supporting Windows, Linux and NetWare, VMware resides as a layer between the hardware and the virtual machine partitions.

Virtual Private Network (VPN)

A network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization’s network.

WBack to Top

War Dialing

A method of automatically scanning telephone numbers using a modem, usually dialing every telephone number in a local area to find where computers or fax machines are available, then attempting to access them by guessing passwords.

Warm Transfer

The practice of transferring escalated service calls by actively engaging the technician at the next highest tier prior to transferring the call. Typically, a warm transfer also includes the transfer of information gathered from the customer, so that the customer is not required to provide the same information twice.

Washington Interagency Telecommunications Services (WITS2001)

The Washington Interagency Telecommunications Services contract through which ITA provides local telecommunications services for its customers.

XBack to Top

YBack to Top

ZBack to Top

Document Guide

ITA services uses a standard template to provide a holistic view of the service offering. The template was created based on input from customers (through working groups and forums) and recommended ITIL best practices. In order to clearly define the intent of each section in a specific catalog entry, ITA has included this document guide. A description of the content to be found in each section is listed below:

Service Definition:

Details the standalone Core Service offering(s), Elective Services and Operations Support elements, to include key business functions and deliverables*

Scope

Defines where an ITA service is available and the groups who are eligible to receive it

Prerequisites for Service

Describes the key obligations the customer must fulfill before services can be provided

Requesting Services

Describes how to request ITA services

Continuity Provisions

Describes how ITA is positioned to ensure continued service during an incident

Security

Lists the security measures that support a service, including physical, infrastructure, and system security

Surge Capacity

Defines the ability of ITA to accommodate increased volume above the normal operational tempo due to an emergency, and the ability to increase staffing to handle additional capacity requests

Service Levels

Service Levels are clearly defined performance thresholds established by ITA based on industry standards and/or the capabilities of the technologies employed to provision services. These quantifiable objectives define the level of service customers can expect from ITA.

Customer Satisfaction

Describes how ITA will maintain and track Customer Satisfaction to improve current services and meet customer expectations

References and Policies

A listing of the references or policy documents that impact the parameters of ITA’s service and how they are delivered