Podcast
Questions and Answers
Which of the following is the primary function of grounding in personnel safety?
Which of the following is the primary function of grounding in personnel safety?
- To divert dangerous currents to the earth. (correct)
- To prevent transient voltages from damaging equipment.
- To establish a common voltage reference point.
- To reduce electrical noise in signal circuits.
What is the main purpose of an Equipment Fault Protective Subsystem?
What is the main purpose of an Equipment Fault Protective Subsystem?
- Establishing a common voltage reference.
- Protecting against voltages caused by electrical faults. (correct)
- Reducing electromagnetic interference.
- Providing a low impedance path to the earth.
In the context of electrical noise reduction, what is the significance of running power and signal cables in separate conduits?
In the context of electrical noise reduction, what is the significance of running power and signal cables in separate conduits?
- It establishes a common voltage reference.
- It reduces electromagnetic interference. (correct)
- It prevents transient voltages.
- It ensures proper grounding.
What condition is most likely indicated by intermittent failures in electronic components?
What condition is most likely indicated by intermittent failures in electronic components?
Which type of failure results in the immediate and complete breakdown of components or circuits?
Which type of failure results in the immediate and complete breakdown of components or circuits?
If a technician needs to determine the uniform engineering and technical requirements for a Department of Defense project, which standard should they consult?
If a technician needs to determine the uniform engineering and technical requirements for a Department of Defense project, which standard should they consult?
What is the purpose of a Security Technical Implementation Guide (STIG)?
What is the purpose of a Security Technical Implementation Guide (STIG)?
Which security area requires personnel to be accompanied by a companion?
Which security area requires personnel to be accompanied by a companion?
What is the primary objective of the Air Force Occupational Safety and Health (AFOSH) program?
What is the primary objective of the Air Force Occupational Safety and Health (AFOSH) program?
Which of the following factors is NOT considered a 'human factor' when evaluating safety and potential mishaps?
Which of the following factors is NOT considered a 'human factor' when evaluating safety and potential mishaps?
Which OSI layer is responsible for determining how much data is sent and at what rate?
Which OSI layer is responsible for determining how much data is sent and at what rate?
Which OSI layer is responsible for device to device delivery of a message?
Which OSI layer is responsible for device to device delivery of a message?
In the TCP/IP model, which layer combines the functions of the Session, Presentation, and Application layers of the OSI model?
In the TCP/IP model, which layer combines the functions of the Session, Presentation, and Application layers of the OSI model?
Which of the following protocols guarantees delivery of data over a network?
Which of the following protocols guarantees delivery of data over a network?
What is the primary function of the Dynamic Host Configuration Protocol (DHCP)?
What is the primary function of the Dynamic Host Configuration Protocol (DHCP)?
What potential issue would the technician address first when troubleshooting network cable connections?
What potential issue would the technician address first when troubleshooting network cable connections?
What is the main advantage of wireless networks?
What is the main advantage of wireless networks?
What factor makes wireless networks susceptible to interference and signal degradation?
What factor makes wireless networks susceptible to interference and signal degradation?
Which of the following tools is used to secure cable ends to connectors by applying mechanical pressure?
Which of the following tools is used to secure cable ends to connectors by applying mechanical pressure?
Which tool is used to identify open virtual ports and services on a host for security assessments?
Which tool is used to identify open virtual ports and services on a host for security assessments?
Flashcards
Grounding
Grounding
The conductive path between the earth and a grounded object, diverting dangerous currents to protect personnel and equipment.
Equipment Protection
Equipment Protection
Prevents spikes and surges from damaging equipment by reducing transient voltages and currents.
Facility Ground System
Facility Ground System
Direct path of low impedance between earth and grounded facility, ensuring safety.
Electrostatic Discharge (ESD)
Electrostatic Discharge (ESD)
Signup and view all the flashcards
Military Standard
Military Standard
Signup and view all the flashcards
Security Technical Implementation Guides (STIGs)
Security Technical Implementation Guides (STIGs)
Signup and view all the flashcards
Active Security Measures
Active Security Measures
Signup and view all the flashcards
Passive Security Measures
Passive Security Measures
Signup and view all the flashcards
Air Force Occupational Safety and Health (AFOSH) Program
Air Force Occupational Safety and Health (AFOSH) Program
Signup and view all the flashcards
Personal Protective Equipment (PPE)
Personal Protective Equipment (PPE)
Signup and view all the flashcards
OSI Model
OSI Model
Signup and view all the flashcards
Application Layer (Layer 7)
Application Layer (Layer 7)
Signup and view all the flashcards
Transport Layer (Layer 4)
Transport Layer (Layer 4)
Signup and view all the flashcards
Network Layer (Layer 3)
Network Layer (Layer 3)
Signup and view all the flashcards
Protocols
Protocols
Signup and view all the flashcards
Connection-oriented Protocol (TCP)
Connection-oriented Protocol (TCP)
Signup and view all the flashcards
Connectionless Protocol (UDP)
Connectionless Protocol (UDP)
Signup and view all the flashcards
DNS (Domain Name System)
DNS (Domain Name System)
Signup and view all the flashcards
Wireless Local Area Network (WLAN)
Wireless Local Area Network (WLAN)
Signup and view all the flashcards
Optical Time Domain Reflectometer (OTDR)
Optical Time Domain Reflectometer (OTDR)
Signup and view all the flashcards
Study Notes
Unit 2: Personal Equipment and Protection
- Grounding provides a conductive path between the earth and a grounded object.
- Personnel safety grounding diverts dangerous currents and activates protective devices.
- Equipment Protection prevents transient voltages and currents that can damage equipment.
- Electrical noise reduction is achieved through various methods.
- Avoid running cables near power sources to reduce electromagnetic interference.
- Run power and signal cables in separate conduits or cable trays.
- Use shielding or filtering for local noise sources.
- Ensure proper grounding with a 3-prong plug.
- Facility Ground System offers a direct low impedance path between earth and the grounded facility.
- Earth Electrode connects the earth and subsystems within a facility ground system.
- Equipment Fault Protective Subsystem protects from voltages caused by electrical faults.
- Equipment Fault Protective Subsystem enables protective devices during circuit faults.
- Signal Reference Subsystem establishes a common voltage reference point and controls electrical noise.
- Modern signal reference subsystems are multipoint systems, grounded to walls and ceilings, like in server rooms.
- Electrostatic Discharge is a sudden flow of electricity between electrically charged objects, also known as static energy.
- All ungrounded materials can develop static electricity.
- Electrostatic Discharge is also known as Triboelectricity.
- Catastrophic failures result in total component or circuit failure
- Intermittent failures cause irregular component or circuit function
- Latent failures cause delayed component or circuit issues
Unit 3: Publications and Directives
- DODI establishes policy.
- DODM implements policy.
- Telecommunications Industry Association (TIA) sets industry standards.
- TIA standards:
- Designing and installing networks, commercial products
- Cable standards (TIA-568)
- Telecommunications pathways and spaces (TIA-569)
- Admin standards for telecommunications standards (TIA-606)
- Military standards:
- Standardizes DOD, establishes uniform engineering and technical requirements
- MIL-STD-1686C covers Electrostatic Discharge Control programs protecting electrical/electronic parts.
- Institute of Electrical and Electronic Engineers (IEEE) collaborates on best practices for technology.
- IEEE creates common tech standards.
- Security Technical Implementation Guides give directions to implement security, identifies vulnerabilities, suggests corrective actions via checklists.
- DOD Security standard managed by Disclosure and Impact Assesment (DISA)
- Categories of risk
- CAT1 can result in loss of life
- CAT2 can result in injury
- CAT3 can affect mission accuracy
- Risks should be thoughtfully assessed in a deployment environment.
Unit 2: Personal and Equipment Protection
- Physical security involves active/passive measures designed to protect.
- Requirements depend on information type/level, equipment type, the unit mission, and duty hours.
- Limiting access is established by creating certain areas, such as:
- Control areas require identification for access
- Restricted areas require a special access badge to enter
- No-Lone Zones require personnel to be accompanied by a companion
- Active measures deter, detect, report, and react against threats, using barriers, cameras, etc.
- Passive measures use architecture, landscaping, and lighting to deter potential threats
- Safety and Health Hazards exist.
- Air Force Occupational Safety and Health (AFOSH) program minimizes loss of resources protects Air Force staff.
- AFOSH manages risks and prevents occupational deaths, injuries, and illnesses.
- Mishaps rarely have a single cause:
- Psychological factors can contribute to unsafe attitudes and negatively impact performance.
- Physical factors can contribute to behaviors that lead to mishaps, such as fatigue, strength limitations, influence, and unauthorized shortcuts.
- Organizational factors can lead to mishaps through inadequate staffing, job production over safety, and lack of supervision.
- Personal protective equipment (PPE):
- Identify PPE requirements for the job and ensure availability when needed
- Bioenvironmental responsibilities
- IAW DAFI 48-145, Occupational health and environmental health, BE provides occupational and environmental (OEH) risk assessments
- Recommended to control health risks
Procedures:
- Office hazards - Greatest safety hazard is falls
- Office safety: no horseplay, clear walkways, managed cords, no food/drink near equipment
- Housekeeping: proper appearance, work habits, good communications equipment, job organization
- Hand Tool Safety: provide good instructions, keep tools in good condition, ensure correct usage
- Electrical hazards: fuses/circuit breakers protect equipment/circuits; electrical ratings can be too high for human safety.
- Radiation hazards can cause initially unseen or unfelt damage.
- Flammable liquids require approved portable containers, grounded containers during filling, and stored in approved areas
- Noise should be minimized, and hearing should be checked annually.
- Technicians must be aware of warning/caution statements.
- Warning statements protect personnel, while caution statements protect equipment.
- Use current checklists/data, do not omit precautions, and never repair equipment without correct data
Unit 4: OSI Model (Open System Interconnection Model)
- There are 7 layers from layer 7 to layer 1.
- The Open System Interconnection (OSI) model describes how a network computer communicates with another on the same network.
- The ISO developed the OSI model in the 1970s, publishing it in 1984.
- The OSI model is a conceptual framework.
- The OSI model has a layered architecture:
- Layers 5-7 are upper layers
- Layers 1-4 are lower layers
- Networks operate on one principle: "pass it on”, where devices send information from one device to another.
- Each layer of the OSI model handles a specific job and passes it to the next layer.
- The layers describe happenings within a networking system.
- The OSI model helps networkers narrow problems:
- Transmitting is from 7-1
- Receiving is from 1-7
- Layer 7 is the Application Layer:
- It is closest to the user, the device itself
- It is where the user inputs data and receives data output
- It relates to services that support user applications.
- Examples include web browsers, applications, protocols (e.g., file transfer, dynamic host configuration, hypertext transfer protocol).
- Layer 6 is the Presentation Layer:
- This is where the operation system lies
- It provides freedom from compatibility issues via data representation translation
- It ensures information sent is reformatted back into the same format as original
- Encryption, decryption, and data compression are done at this layer
- Protocols include JPEG, GIF, MPEG, MIDI, etc.
- Layer 5 is the Session Layer:
- It establishes, manages, and terminates connections between applications on the host
- It establishes, coordinates, and terminates communication exchanges and dialogues between applications on different devices.
- Layer 4 is the Transport layer:
- It coordinates data transfer between the end systems and hosts
- It determines how much data is sent at what rate
- The session establishes a connection
- It is responsible for end-to-end recovery and flow control
- Layer 4 transport protocols:
- TCP (transmission control protocol)
- Slower, more reliable
- Transferring a file, email
- More secure, better for the possible risk
- UDP (User Datagram Protocol)
- Faster, less reliable, may have to stop and buffer
- Using pandora, skype
- wants to eliminate lag, make it more real-time
- A game will use TCP to load a multiplayer pvp game map (Fortnite), but once the game is loaded, it will switch to UDP to eliminate lag
- Packets received out of order is when your character is rubber banding (jumping back and forth and what not)
- Missing packets are when you're moving, you freeze for a moment, and then you teleport to where you should be
- Layer 3 is the Network layer:
- It handles addressing.
- Its functions at this layer are therefore routing and forwarding
- This layer operates at routers.
- Routers connect networks, such as a private network or user to the internet
- The router acts as a dispatcher, choosing the best path for information to travel
- Protocols include ARP, RIP, IPv4 (IP addresses), IPv6 (successor to IPv4).
- Layer 2 is the Data Link Layer:
- It is responsible for device to device delivery of a message
- Its main function is to make sure data transfer is *&
- It Uses a MAC address, (not an IP address;) to ensures data is sent to the correct destination on the local network
- Switches operate at this layer
- Connects computers, printers, servers, and other devices to the private network
- It does not need IP
- Examples: IEEE 802.11 Wi-Fi; Media access control (MAC) addressing
- Layer 1 is the Physical Layer:*
- Physical Layer conveys a bit stream through the network at the electrical and mechanical level.
- Physical Layer provides the hardware to send/receive data, including cables and network interface cards.
- It represents where the "1s and 0s" take place.
- Layer 1 represents system electrical and physical aspects.
- Physical Layer examples:
- Physical topologies
- Digital subscriber line
- Connectors like RJ-45, RS-232
- If a network problem happens, many professionals check cables at the physical layer.
- Protocols on layers 6/7 differ: layer 7 (websites) relies on layer 6 for operation; ensures information transfers properly.
- A helpful mnemonic for the data packet flow through model is "A Penguin Said That Nobody Drinks Pepsi”
- In the OSI model, operations occur in reverse order upon receiving by decapsulation (steps occur in reverse order on the receiving end through a process of decapsulation*).
Unit 5: Ports, Protocols, and Services
- Standards: Protocols are rules allowing electronics to communicate over a network.
- Protocols are like a language
- Protocols are key to digital communication, dictating how to format and transmit data.
- TCP/IP Suite is a comprehensive set of communication protocols enabling networked device communication and data exchanges
- Protocols in the suite allow different aspects
- The TCP/IP suite provides modern internet foundation
- Governs how data is packeted, addressed, transmitted router and received across the internet
- The Application Layer compresses first 3 from the OSI Model, it is more flexible and adaptable to different network technologies/applications
Application layer(Layer 5):
- Sits at the top of the application
- Provides a user interface
- HTTP is the most used tcp/ip application protocol Layer
- Generates a message such as when a web browser is requesting a web page to &
Transport Layer:Layer 4
- Creates virtual TCP of UDP connections between applications running on different hosts
- Deals with the coordination of the data transfer between end systems and hosts
- It determines how much data is sent and at what rate. The Transport Layer is responsible for end-to-end error recovery, flow control and ensures complete data transfer
Network Layer:Layer 3
- Deals with packages (IP)
- responsible for creating the IP packets that move across network
- when transmitting data, adds a heading containing the source and destination IP address to the data received from transport layer
- when receiving data, this layer is used to determine if a packet received by the host contains the host's IP address
Data link:Layer 2
- Deals with frames (MAC)
- Responsible for creating frames that move across the network
- When transmitting data, the data link layer adds a header containing the source destination &
- When receiving data, checks if the MAC address is there
Physical layer(Layer 1)
- Same as OSI Model
- Connection-oriented protocol: TCP
- Data delivery over a network of OSI is guaranteed by the protocols used to transmit
- Manages point-to-point Unitas;s transmission of data
- Enables computers to establish a connection and exchange data streams
- provides sequencing and that data is delivered successfully
- Message transfer from source to destination is in an ordered and error checking stream
- Data segments are broken down into segments which the receiving computer reassembles
- Verifies that all data has been sent through acknowledgments:
- If a segment is missing, the receiving system requests them again
- ACK/NACK, Three-way handshake
- Both machines acknowledge each other's presence before sending items
- Resides at layer 4 of OSI and TCP/IP suite models:
- Some applications and their protocols require the error detection and the reliable/ordered delivery of packets provided by TCP-
- Connectionless oriented protocol: UDP
- Does not need an end-to-end connection
- Does not provide data flow control
- Minor packet loss can be tolerated and message transfer is one point to another without checking for order
- Message transfer is one point to another without checking for order
- Allows for minor packet loss, but does not provide security measures with communication
- Speed is the importance
- adds a UDP header to messages recited=ved from applications detailing source and destination port numbers
- Can be a multicast or not
- Efficient troubleshooting: if you encounter problems with web browsing, understanding http is used for web traffic allows you to focus on http-related issues
- Better security: you can better identify and respond to security threats
- effective network management: enables efficient network admin and troubleshooting
TCP Protocols
- HTTP
- Allows you to view websites using a web browser
- Defines how data is formatted, transmitted and what actions web servers and browsers should take in response to various commands
- Helpful to interact with the internet world
- since it uses TCP, it is a connection-oriented protocol*
FTP Protcol
- method of transferring data files from one computer to another over a network
- most basic way of sending and receiving -Segments are transmitted into segments which the receiving computer reassembles as an exact copy of the original -connection oriented -performs auto error check
SMTP protocol
- used for emails and attachments
- connection oriented
Protocol ports
- A port is a virtual path to send and receive data from computers
- used to communicate between two different applications
- part of tcp/ip networking
- connected
- network devices like computers and routers automatically manage network traffic using virtual ports
- computers can have around 65,535 ports with some points having an assigned purpose
UDP Protocols
- (connectionless)
Internet protocol (IP)
- basis for addressing on all TCP/IP networks
- connectionless-oriented
- network layer of the OSI model
- for devices to communicate. Over the network
SNMP Protocols
- Connectionless
- set of protocols to permit remote monitoring sand management of devices and hosts
- set of protocols to permit remote monitoring sand management of devices and hosts,
Connectionless does not use three-way handshake, connected does
- DNS
- (Domain Name System)
- matches a friendly name to its assigned IP address on the internet
- Connectionless
Routing System
- RIP
- (Routing information protocol) - Uses broadcast UDP data packets to exchange routing information - for example, Cisco software sends routing information updates every 30 seconds which is called advertising Connectionless
Dynamic Host Configuration
- DHCP
- (Dynamic host configuration protocol)
- protocol for automatically assigning dynamic IP addresses to devices on the network
- dynamic addressing allows the device to have different IP addresses every time it connects to the network Connectionless
- Address Resolution protocol
- ARP (address resolution protocol) uses for resolving (converting) Network Layer IP addresses into Data Link Layer addresses MAC
-
- MAC never changes, the IP can change though. Allows a lot more security in assuring an item gets sent to the correct device
- stays within the boundaries of a single network; is never routed across internetwork nodes/devices.
- Request and reply protocol
- Connectionless
Connectionless Protocol
- does not use three-way handshake, connected does
- IANA
- (Internet Assigned Numbers Authority)
- the organization responsible for maintaining official assignments of port numbers
- for specific uses.
Three ranges:
- well known (0-1023)
- registered (1024-49151) (a company wants their service to be higher priority. Essentially the company has purchased that port)
- dynamic to private or ephemeral ports (49152-65535
Unit 6: IP Addressing Fundamentals:
Radix is written as a subscript to a number
- RADIX-WRITTEN AS A SUBSCRIPT TO A NUMBER
- The radix is written as a subscript to a number.
- in the number 250(10), the (10) in the subscript identifies the number system (decimal in this case) and identifies the quantity of Arabic numerals or symbols used in the system.
-
- The radix is the base of the number system.
Examples:
- Decimal: 250(10)
- Binary: 11011(2)
- Hexadecimal: 5DC(16)
- The Radix says the number of values that can be used in the system.
PARTS OF A NUMBER
Least significant digit: LSD: is always furthest to the right Most significant digit: MSD: is always furthest to the left
- In the number 3,286 (10), the 3 is the MSD because it represents three thousand. The 6 is the LSD because it represents only six.
- Decimal: Decimal uses 10 digits with a base radix of 10
- in order to increase a number in a decimal weighted table we multiply 10 by itself
- Binary: binary only consists of 2 digits with a base radix of 2
- Hexadecimal
- The place-value of a digit is determined by its position in the number. In the decimal numbering system, the place value multiplies by the base as you move left and divides by the base as you move right. The same basic principles hold true in all numbering systems.
Unit 7: Wireless Networking
- Wireless frequencies use wireless data to transmit and receive data through radio waves Devices can join more than one wireless network through radio waves
- A wireless connection eliminates the need for wires to connect any device/system
- Wireless connections are Flexible with low costs/provide high standards of service Broadcast at a much higher frequency than regular radio
Wireless Networking
When the radio frequency is applied to Wireless Access Point (WAP) antennas, an electromagnetic field is created which is then radiated throughout the area to be received by the user device.
Types of Wireless Networks:
Wireless wide area network
- WWAN)
- Wireless Wide Area Network provides a wide area networks can reach cities, regions and even cities Wireless networks connect to hotspot simply wireless through phone providers
Local Area Network
- WLAN)
- links two or more devices using a wireless distribution network in a limited area such as a home
- Most modern WLANs are based on IEEE 802.11 standard, marketed under the Wi-Fi brand name support can range from 2 or more objects, but once the number of devices increases, the network becomes difficult to manage
- repeaters or signal boosters to cover a vast geographical location SSID: wireless connections can be established to join the wireless network. The SSID is the name of the network
BSSID:
wireless wireless access identifies the access points and their identifiers, included in all wireless packets
ESSID is what links
provides
- all the BSSs in the network, Wireless signals on an ESS are connected by a centralized distribution system Wireless AP broadcasts to reach network
Wireless Personal Area Network (WPAN):
provides wireless networks
Wireless Metropolitan Area Network (WMAN)
a range covered to 31 miles local Base Area Network (BAN) or local Campus Area Network (CAN) allowing multiple locations or buildings to maintain in connection within any metropolitan area
Hybrid wireless networks
hybrid networks rely on radio ore infrared lights to transmit data, easily attacked
Main network
the main purpose is to connect two independent and fully functional LAN nodes, networks Rely on wireless as well as wired signals a hybrid router transmits a Wi-Fi signal but also contains ports connected
- Wireless Ad Hoc Network
wireless networks that can sustain itself without any existing infrastructure a peer-to-peer network does not rely on wireless router or a central AP to transmit data from one point to another
The access point
the access point (AP) device is the most important device in a wireless network creates a Wireless Local Area Network (WLAN)
- connects to a wired router or a switch via an Ethernet cable and transmits a Wi-Fi signal to a designated area
- In Local Area Networks (LANs) and Wide Area Networks (WANs), a network node is a device that performs a specific function each node needs a MAC address for each Network Interface Card it possesses
Wireless advantages
- Fast Mobility
- quick set up
- access points allows a wider reach of area to be connected
disadvantages:
- Slower than wired networking when transferring files over a LAN
- Performance worsens if you have a busy network or signal strength is weaker than optimal
- reliability is a difficult due to limited channels available
- limited Security with wirelss networks
- Reduced management controls: easier to connect unsanctioned devices, consuming more bandwidth
- Wireless networks are prone to interference depending on environment
Wireless Protocols:
- Where Wi-Fi's two frequencies, *2.4GHz and 5GHz, * That's where Wi-Fi's two frequencies, 2.4GHz and 5GHz, come in. Wi-Fi can broadcast on both frequencies, helping its signal cut through all the noise and deliver a fast, strong signal from your wireless router to your device.
- Access Points are an import part of any connectivity to networks enhances security and stops any unauthorized access provides high network security and flexibility for regular network usage
- Autonomous Access Point Manage WLAN processes with no need for additional controllers or switches
- It can connect on it's own
- can connect to a typical wireless network
- Lightweight Wireless Connections are known as controller access point connections for networks
- -rogue access point are known as wireless hacking portals
- installed on a secure network without a security password
- poses a security threat
- can allow access to a secure network for hacking and such
Unit 8: Wired and Wireless Media
- Copper cable a, fiber, wireless transmissions
- Copper Cable:
- Twisted Pair: wires
- Shielded (STP) or unshielded (UTP) wires create connections between computers and devices
- STP cables have shielded wires
- UTP do not have shielded wires
- Eight insulated wires, separated into 4 different pairs Precise specifications govern the number of twists/braids per meter
- UTP:
- is implemented using inexpensive, modular telephone-type connectors
PIN
pin: layouts alpha and bravo three configurations:
- Cable connections transmit pins on end of cable pins connecting (such as PC to a switch)
- cabling from transmission through switches
- transmission of relieve pins are swapped on opposite ends of the cable. Used to connect two like devices (pc to pc connections to computers,wireless)
Common console
- the console port commonly referred to as for computer, used to connect computer. connects a series of cables
STP
- combined shielding and twisting to prevent against signal degredation.
- Reduces noise both within and outside the cable noise in the cable is referred to as “cross-talk" (info bleeding from one pair to another)
- Fiber for cable connections Technology
- Technology converts electrical signals into optical/light signals immune to all types of electromagnetic frequency monitoring (EMF) because there is no EM radiation
Types of Cable connection
-
Two types: Multi-Mode Fiber and Single-Mode Fiber. (MMF and SMF) multimode cable fibers that connect
-
cable allows 50-100 micrometers, larger core allows many modes, or paths, of light to propagat down the fiber.
Cable length
- Supports longer segment lengths than twisted-pair wire, but shorter segment lengths than SMF Lights used on cables Light source is from LEDs
Single mode:
10 micrometers powered by some type of laser can handle much longer distances than multimode
- Wireless transmissions for media network
- no physical constraints
- atmospheric conditions can affect wireless transmission
- most used wireless media are light transmissions and radio waves
- Light transmissions:
- uses lasers to transmit and receive network signals requires a clear line of sight and precise alignment between devices offers some security due to them limited area form which signal can be monitored The cables transmit and uses radiowave
Radio waves:
- land based or space based
- Originate from a land-based system and are transmitted to satellite then back down
- The larger broadcast range of space-based transmissions, the more susceptible they are tp being monitored
- radio waves for networking purposes are typically microwave frequencies in 1-20 gigahertz (GHz) range.
Signal for cable networks
- transmission
security is poor since carrier frequency is known and so are easy to
monitor and/or jam
- Example is a channel broadcast by a radio station
Transmission network
- Example - transmits a signal across a broad frequency bandwidth and varies as the RF carrier frequency carries
Provides networks with increased power and transmission connection and connection to other systems
Advantages of wireless transmission:
-
Mobility easy transmission
-
relocatable
-
cable transmission is easy with wireless network setups
-
there is poor speed transmission Disadvantages of cable transmission are known for. Poor speed
-
cable speeds are quick, there is difficult set up process with cable set ups
Unit 9: Troubleshooting Methodology
Identify cables as the solution and try to address problems with the signal or cable length to fix Trying to address the symptoms without diagnosing the underlying cause can be dangerous. Obtain info from three different sources that connect for any signal problems:
- Find all sources the network connects together through the following cable and wireless connections:
- get info from user to find issues of network - computer in the form of logs and error messages for any network connectivity
- personal observation if possible
- Get and make a backup copy to restore network if needed
- Establish a list of all the probable causes cable ports or networks List all causes, even if they are improbable
- Prioritize from most to least likely
- Test the cables through all possible reasons for network set up and try to narrow down cables
- test the theory to see if it is the actual cause set up and test to make sure the network
- Establish a plan of action to resolve the problem and implement the solution: cable connections or wireless transmissions
Test the plan steps
- The plans can be simple or complex: transmission is easy with wireless networks
Check all wires and connections
Write the plan step-by-step and trace for any issues the network connection is the network connections right for: to get better network connections and signal strength
Test by: identifying when you know which network is being used
Identify the downtime is in good connection by knowing how to fix the cables and problems with network transmission
Create the connection by ensuring the network impact and good internet
Verify that the network connections and good, set up any needed connections and network connection
-
Document and show all findings in the network Testing new issues can sometimes introduce new problems, check and document
-
Root Cause Analysis (RCA with cable and wires): Check signal with device Unit 10: Specializing Tools
-
Hardware and network tools connection is vital
-
Set up tools
-
Crimped/crimping tool has proper power supply
-
secres cable ends connects to device through the use of application with mechanical preassure
-
Cable tester with the use of good connection
-
with good connections and proper connections for cable the device and signal can connect
-
displays function *& Loopback
-
loop cables test for signal connectivity Facilitate self check and internet connectivity for good network connection
-
punchdown tools are used for great signals
-
terminals wires that connects with block
-
aligns wire with a slot and pressed into place using the tool. wireless connecting tool Test cable for :
-
Optical time domain reflectometer for wire and wireless connections to run proper
-
checks for breaks in fiber optic cables by sending a signal and measuring the light is great for proper fiber optic light cable transmission and connectivity between devices
Establishes light connectivity, cable connection can estimate the signal that comes from the wire and connection
- optical connection from light and to wire and connectivity
- optical power lights Works in conjunction with an optical Leigh's source to measure the signal strength to detect/measure with fiber connectivity
Helps for better clarity for the power meters
-tone Generates connection fox with lights and light sources
Light that connect to cables and good source for light to the wire the connection
Cable provides clarity for tracing and with cable with intensity sounds or lights as the probe approaches the cable for connectivity
Better lighting connections provide strong signal for cable and ports connected
Aids technicians with identifying faulty components or sections within malfunctioning
- better wireless connection that allows for strong connectivity
- use great and and strong wires for better signal
Cable signal: measure voltage, resistance, and continuity Test ports to see that all connections are connecting properly
Software with easy use and set up for troubleshooting connectivity
Port Scanners: allows open, virtual and better network services in a host, crucial for great signal and great connection
Easy connection and secure assess by legitimate connectivity
- protocol analyzer: provides great capture and analyses
Signal is transmitted with cables by providing to see the connection addresses and connectivity and speed connection
Great use for bandwidth for high speed transmission bandwidth speed tester: better internet connection with up and downward
- samples files, calculating speeds in MBPS or KBPS - easy upload and download speed and capacity
- results easily compared to great wifi signal transmission allows the use of great wifi signals:
Connectivity has better wireless signal
Helps better signal reception and high internet speed Allows better network, use
-
for connectivity issues using signal to great reach and connectivity strength with Echoes strong
-
Easy to setup great power cables to test connectivity for cable use, simple!
-
Internet is the great communication source for connectivity
-
Internet controls the connection quality in short: great quality connection and strength will increase
-
To trace and network from a destination you can send devices to
-
Cable is great source, device connectivity provides light and great sources
-
Results allows the cables and routers to have higher power and transmissions
-
Results shows that when connected great cables they have excellent and consistent with transmission
-
Easy and has quick power access and is very connectivity friendly!
-
Great connectivity and cable transmission:
-
Cable set up with connection domains Cables are great to get the Internet set up quick Quick and better set ups and configurations Access to better devices Set great display settings
-
set up with better local and foreign accessibility
-
Results show for wireless systems great internet and signals
Connectivity is better when the settings are great easy and quick to download internet
- A connection that set great connectivity between to systems and makes MAC and internet connections
Better wire strength, better performance, better transmission Easy transmission through all networks, ports with greater connection speeds Better set up easier networks, connectivity with great power Better internet connections the faster the computer signal to connect to Wi-Fi Make sure Wi-Fi has strong signal and settings that will allow for the connection to be great! connectivity and strength! Connect better set up: easy to access The greater the power, the better connectivity transmission the easier to transmit through wireless connectivity with internet!
- Great sources for connectivity tests and easy access internet - make a wireless environment better for your home or office to use by testing all source to ensure great reliability and easy connectivity for great use
Test is set up for the network
- Is A device connection cable
- A great internet cable test to ensure that everything is working great together and providing great power and connectivity
- Ensure all ports are in place and not being moved to ensure that the cable stays in place!
Network monitoring
Good to set up better protection by having that connection and making sure that there is not to much interference
-
A great test that set up monitoring to protect networks from easy network connection to easy access is great!
-
Cable is a source of protection better set up for high connectivity and easy sources with great ports for better wireless transmission: set up great network for strong and better access
-
Aids from any unauthorized signal and access,
-
Helps build up internet strength A network scan should take quick if you connect the right signal!
-
NMS: Network monitoring systems: Is great for protection!
-
Has better cable connections and is easy to use Great with cables and set ups to protect from network breaches Great to ensure the power in right in place Helps identify what you were doing! Easy easy easy to use! Quick and secure and efficient for cables
-
- Simple set up
-
Great for protection and protection use and high connectivity to stay high with power
-
Allows a great setting for devices for high use set to
Wireless connections also may need a good cable connection or will make the internet in an area easily accessible in certain spots and not be to use because the wireless connection is low
Test all internet spots to get the greater knowledge!
Cable and wireless strength can make all things connect in ways that provides: wireless network
- cable setting great speeds for internet
- Good and right amount of accessibility
Helps people provide and create great and working network setups and great system in place- Helps network connectivity! Network settings are highly important and can not take lightly! Great connection for all users Notify if anything is ever wrong or what can happen!
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.