Personal Equipment and Protection

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is the primary function of grounding in personnel safety?

  • To divert dangerous currents to the earth. (correct)
  • To prevent transient voltages from damaging equipment.
  • To establish a common voltage reference point.
  • To reduce electrical noise in signal circuits.

What is the main purpose of an Equipment Fault Protective Subsystem?

  • Establishing a common voltage reference.
  • Protecting against voltages caused by electrical faults. (correct)
  • Reducing electromagnetic interference.
  • Providing a low impedance path to the earth.

In the context of electrical noise reduction, what is the significance of running power and signal cables in separate conduits?

  • It establishes a common voltage reference.
  • It reduces electromagnetic interference. (correct)
  • It prevents transient voltages.
  • It ensures proper grounding.

What condition is most likely indicated by intermittent failures in electronic components?

<p>Irregular failure (C)</p> Signup and view all the answers

Which type of failure results in the immediate and complete breakdown of components or circuits?

<p>Catastrophic (C)</p> Signup and view all the answers

If a technician needs to determine the uniform engineering and technical requirements for a Department of Defense project, which standard should they consult?

<p>Military Standard (D)</p> Signup and view all the answers

What is the purpose of a Security Technical Implementation Guide (STIG)?

<p>To guide the implementation of security measures and identify vulnerabilities. (C)</p> Signup and view all the answers

Which security area requires personnel to be accompanied by a companion?

<p>No-Lone Zone (D)</p> Signup and view all the answers

What is the primary objective of the Air Force Occupational Safety and Health (AFOSH) program?

<p>To minimize the loss of Air Force resources and protect personnel. (D)</p> Signup and view all the answers

Which of the following factors is NOT considered a 'human factor' when evaluating safety and potential mishaps?

<p>Environmental factors (B)</p> Signup and view all the answers

Which OSI layer is responsible for determining how much data is sent and at what rate?

<p>Transport Layer (C)</p> Signup and view all the answers

Which OSI layer is responsible for device to device delivery of a message?

<p>Data Link (B)</p> Signup and view all the answers

In the TCP/IP model, which layer combines the functions of the Session, Presentation, and Application layers of the OSI model?

<p>Application Layer (C)</p> Signup and view all the answers

Which of the following protocols guarantees delivery of data over a network?

<p>TCP (C)</p> Signup and view all the answers

What is the primary function of the Dynamic Host Configuration Protocol (DHCP)?

<p>Automatically assigning dynamic IP addresses to devices on a network (B)</p> Signup and view all the answers

What potential issue would the technician address first when troubleshooting network cable connections?

<p>Physical layer (A)</p> Signup and view all the answers

What is the main advantage of wireless networks?

<p>Elimination of the need for wires (C)</p> Signup and view all the answers

What factor makes wireless networks susceptible to interference and signal degradation?

<p>The radio frequency (RF) environment. (D)</p> Signup and view all the answers

Which of the following tools is used to secure cable ends to connectors by applying mechanical pressure?

<p>Crimping tool (A)</p> Signup and view all the answers

Which tool is used to identify open virtual ports and services on a host for security assessments?

<p>Port scanner (C)</p> Signup and view all the answers

Flashcards

Grounding

The conductive path between the earth and a grounded object, diverting dangerous currents to protect personnel and equipment.

Equipment Protection

Prevents spikes and surges from damaging equipment by reducing transient voltages and currents.

Facility Ground System

Direct path of low impedance between earth and grounded facility, ensuring safety.

Electrostatic Discharge (ESD)

Sudden flow of electricity between electrically charged objects. Also known as triboelectricity.

Signup and view all the flashcards

Military Standard

Establishes uniform engineering/technical requirements within the Department of Defense.

Signup and view all the flashcards

Security Technical Implementation Guides (STIGs)

A guide on implementing security at a technical level, providing vulnerability checks and fixes.

Signup and view all the flashcards

Active Security Measures

Designed to deter, detect, report, and react against threats using systems like cameras and barriers.

Signup and view all the flashcards

Passive Security Measures

Uses architecture and landscaping to deter threats, like bright lighting and controlled entrances.

Signup and view all the flashcards

Air Force Occupational Safety and Health (AFOSH) Program

Minimize losses and protect personnel by managing risks in the Air Force.

Signup and view all the flashcards

Personal Protective Equipment (PPE)

Ensure proper PPE is available, maintained, and that personnel are trained in its use.

Signup and view all the flashcards

OSI Model

A conceptual framework to better understand how a computer on a network communicates with another.

Signup and view all the flashcards

Application Layer (Layer 7)

Closest to the user, provides interface and services that support user applications.

Signup and view all the flashcards

Transport Layer (Layer 4)

Deals with coordination of data transfer, determines how much data is sent at what rate, end-to-end recovery and flow control.

Signup and view all the flashcards

Network Layer (Layer 3)

Responsible for routing and forwarding data packets across networks using IP addresses.

Signup and view all the flashcards

Protocols

A standard set of rules that allows electronics to communicate over a network; protocols dictate format and transmission.

Signup and view all the flashcards

Connection-oriented Protocol (TCP)

Guarantees delivery of data over a network by establishing a connection and providing error checking.

Signup and view all the flashcards

Connectionless Protocol (UDP)

Does not establish an end-to-end connection; prioritizes speed over reliability.

Signup and view all the flashcards

DNS (Domain Name System)

Maps a friendly name to its assigned IP address on the internet.

Signup and view all the flashcards

Wireless Local Area Network (WLAN)

Links devices using a wireless distribution network in a limited area, often based on IEEE 802.11 standards.

Signup and view all the flashcards

Optical Time Domain Reflectometer (OTDR)

Used to find breaks in fiber optic cables by measuring reflected light.

Signup and view all the flashcards

Study Notes

Unit 2: Personal Equipment and Protection

  • Grounding provides a conductive path between the earth and a grounded object.
  • Personnel safety grounding diverts dangerous currents and activates protective devices.
  • Equipment Protection prevents transient voltages and currents that can damage equipment.
  • Electrical noise reduction is achieved through various methods.
  • Avoid running cables near power sources to reduce electromagnetic interference.
  • Run power and signal cables in separate conduits or cable trays.
  • Use shielding or filtering for local noise sources.
  • Ensure proper grounding with a 3-prong plug.
  • Facility Ground System offers a direct low impedance path between earth and the grounded facility.
  • Earth Electrode connects the earth and subsystems within a facility ground system.
  • Equipment Fault Protective Subsystem protects from voltages caused by electrical faults.
  • Equipment Fault Protective Subsystem enables protective devices during circuit faults.
  • Signal Reference Subsystem establishes a common voltage reference point and controls electrical noise.
  • Modern signal reference subsystems are multipoint systems, grounded to walls and ceilings, like in server rooms.
  • Electrostatic Discharge is a sudden flow of electricity between electrically charged objects, also known as static energy.
  • All ungrounded materials can develop static electricity.
  • Electrostatic Discharge is also known as Triboelectricity.
  • Catastrophic failures result in total component or circuit failure
  • Intermittent failures cause irregular component or circuit function
  • Latent failures cause delayed component or circuit issues

Unit 3: Publications and Directives

  • DODI establishes policy.
  • DODM implements policy.
  • Telecommunications Industry Association (TIA) sets industry standards.
  • TIA standards:
  • Designing and installing networks, commercial products
  • Cable standards (TIA-568)
  • Telecommunications pathways and spaces (TIA-569)
  • Admin standards for telecommunications standards (TIA-606)
  • Military standards:
  • Standardizes DOD, establishes uniform engineering and technical requirements
  • MIL-STD-1686C covers Electrostatic Discharge Control programs protecting electrical/electronic parts.
  • Institute of Electrical and Electronic Engineers (IEEE) collaborates on best practices for technology.
  • IEEE creates common tech standards.
  • Security Technical Implementation Guides give directions to implement security, identifies vulnerabilities, suggests corrective actions via checklists.
  • DOD Security standard managed by Disclosure and Impact Assesment (DISA)
  • Categories of risk
  • CAT1 can result in loss of life
  • CAT2 can result in injury
  • CAT3 can affect mission accuracy
  • Risks should be thoughtfully assessed in a deployment environment.

Unit 2: Personal and Equipment Protection

  • Physical security involves active/passive measures designed to protect.
  • Requirements depend on information type/level, equipment type, the unit mission, and duty hours.
  • Limiting access is established by creating certain areas, such as:
  • Control areas require identification for access
  • Restricted areas require a special access badge to enter
  • No-Lone Zones require personnel to be accompanied by a companion
  • Active measures deter, detect, report, and react against threats, using barriers, cameras, etc.
  • Passive measures use architecture, landscaping, and lighting to deter potential threats
  • Safety and Health Hazards exist.
  • Air Force Occupational Safety and Health (AFOSH) program minimizes loss of resources protects Air Force staff.
  • AFOSH manages risks and prevents occupational deaths, injuries, and illnesses.
  • Mishaps rarely have a single cause:
  • Psychological factors can contribute to unsafe attitudes and negatively impact performance.
  • Physical factors can contribute to behaviors that lead to mishaps, such as fatigue, strength limitations, influence, and unauthorized shortcuts.
  • Organizational factors can lead to mishaps through inadequate staffing, job production over safety, and lack of supervision.
  • Personal protective equipment (PPE):
  • Identify PPE requirements for the job and ensure availability when needed
  • Bioenvironmental responsibilities
  • IAW DAFI 48-145, Occupational health and environmental health, BE provides occupational and environmental (OEH) risk assessments
  • Recommended to control health risks

Procedures:

  • Office hazards - Greatest safety hazard is falls
  • Office safety: no horseplay, clear walkways, managed cords, no food/drink near equipment
  • Housekeeping: proper appearance, work habits, good communications equipment, job organization
  • Hand Tool Safety: provide good instructions, keep tools in good condition, ensure correct usage
  • Electrical hazards: fuses/circuit breakers protect equipment/circuits; electrical ratings can be too high for human safety.
  • Radiation hazards can cause initially unseen or unfelt damage.
  • Flammable liquids require approved portable containers, grounded containers during filling, and stored in approved areas
  • Noise should be minimized, and hearing should be checked annually.
  • Technicians must be aware of warning/caution statements.
  • Warning statements protect personnel, while caution statements protect equipment.
  • Use current checklists/data, do not omit precautions, and never repair equipment without correct data

Unit 4: OSI Model (Open System Interconnection Model)

  • There are 7 layers from layer 7 to layer 1.
  • The Open System Interconnection (OSI) model describes how a network computer communicates with another on the same network.
  • The ISO developed the OSI model in the 1970s, publishing it in 1984.
  • The OSI model is a conceptual framework.
  • The OSI model has a layered architecture:
  • Layers 5-7 are upper layers
  • Layers 1-4 are lower layers
  • Networks operate on one principle: "pass it on”, where devices send information from one device to another.
  • Each layer of the OSI model handles a specific job and passes it to the next layer.
  • The layers describe happenings within a networking system.
  • The OSI model helps networkers narrow problems:
  • Transmitting is from 7-1
  • Receiving is from 1-7
  • Layer 7 is the Application Layer:
  • It is closest to the user, the device itself
  • It is where the user inputs data and receives data output
  • It relates to services that support user applications.
  • Examples include web browsers, applications, protocols (e.g., file transfer, dynamic host configuration, hypertext transfer protocol).
  • Layer 6 is the Presentation Layer:
  • This is where the operation system lies
  • It provides freedom from compatibility issues via data representation translation
  • It ensures information sent is reformatted back into the same format as original
  • Encryption, decryption, and data compression are done at this layer
  • Protocols include JPEG, GIF, MPEG, MIDI, etc.
  • Layer 5 is the Session Layer:
  • It establishes, manages, and terminates connections between applications on the host
  • It establishes, coordinates, and terminates communication exchanges and dialogues between applications on different devices.
  • Layer 4 is the Transport layer:
  • It coordinates data transfer between the end systems and hosts
  • It determines how much data is sent at what rate
  • The session establishes a connection
  • It is responsible for end-to-end recovery and flow control
  • Layer 4 transport protocols:
  • TCP (transmission control protocol)
  • Slower, more reliable
  • Transferring a file, email
  • More secure, better for the possible risk
  • UDP (User Datagram Protocol)
  • Faster, less reliable, may have to stop and buffer
  • Using pandora, skype
  • wants to eliminate lag, make it more real-time
  • A game will use TCP to load a multiplayer pvp game map (Fortnite), but once the game is loaded, it will switch to UDP to eliminate lag
  • Packets received out of order is when your character is rubber banding (jumping back and forth and what not)
  • Missing packets are when you're moving, you freeze for a moment, and then you teleport to where you should be
  • Layer 3 is the Network layer:
  • It handles addressing.
  • Its functions at this layer are therefore routing and forwarding
  • This layer operates at routers.
  • Routers connect networks, such as a private network or user to the internet
  • The router acts as a dispatcher, choosing the best path for information to travel
  • Protocols include ARP, RIP, IPv4 (IP addresses), IPv6 (successor to IPv4).
  • Layer 2 is the Data Link Layer:
  • It is responsible for device to device delivery of a message
  • Its main function is to make sure data transfer is *&
  • It Uses a MAC address, (not an IP address;) to ensures data is sent to the correct destination on the local network
  • Switches operate at this layer
  • Connects computers, printers, servers, and other devices to the private network
  • It does not need IP
  • Examples: IEEE 802.11 Wi-Fi; Media access control (MAC) addressing
  • Layer 1 is the Physical Layer:*
  • Physical Layer conveys a bit stream through the network at the electrical and mechanical level.
  • Physical Layer provides the hardware to send/receive data, including cables and network interface cards.
  • It represents where the "1s and 0s" take place.
  • Layer 1 represents system electrical and physical aspects.
  • Physical Layer examples:
  • Physical topologies
  • Digital subscriber line
  • Connectors like RJ-45, RS-232
  • If a network problem happens, many professionals check cables at the physical layer.
  • Protocols on layers 6/7 differ: layer 7 (websites) relies on layer 6 for operation; ensures information transfers properly.
  • A helpful mnemonic for the data packet flow through model is "A Penguin Said That Nobody Drinks Pepsi”
  • In the OSI model, operations occur in reverse order upon receiving by decapsulation (steps occur in reverse order on the receiving end through a process of decapsulation*).

Unit 5: Ports, Protocols, and Services

  • Standards: Protocols are rules allowing electronics to communicate over a network.
  • Protocols are like a language
  • Protocols are key to digital communication, dictating how to format and transmit data.
  • TCP/IP Suite is a comprehensive set of communication protocols enabling networked device communication and data exchanges
  • Protocols in the suite allow different aspects
  • The TCP/IP suite provides modern internet foundation
  • Governs how data is packeted, addressed, transmitted router and received across the internet
  • The Application Layer compresses first 3 from the OSI Model, it is more flexible and adaptable to different network technologies/applications

Application layer(Layer 5):

  • Sits at the top of the application
  • Provides a user interface
  • HTTP is the most used tcp/ip application protocol Layer
  • Generates a message such as when a web browser is requesting a web page to &

Transport Layer:Layer 4

  • Creates virtual TCP of UDP connections between applications running on different hosts
  • Deals with the coordination of the data transfer between end systems and hosts
  • It determines how much data is sent and at what rate. The Transport Layer is responsible for end-to-end error recovery, flow control and ensures complete data transfer

Network Layer:Layer 3

  • Deals with packages (IP)
  • responsible for creating the IP packets that move across network
  • when transmitting data, adds a heading containing the source and destination IP address to the data received from transport layer
  • when receiving data, this layer is used to determine if a packet received by the host contains the host's IP address

Data link:Layer 2

  • Deals with frames (MAC)
  • Responsible for creating frames that move across the network
  • When transmitting data, the data link layer adds a header containing the source destination &
  • When receiving data, checks if the MAC address is there

Physical layer(Layer 1)

  • Same as OSI Model
  • Connection-oriented protocol: TCP
  • Data delivery over a network of OSI is guaranteed by the protocols used to transmit
  • Manages point-to-point Unitas;s transmission of data
  • Enables computers to establish a connection and exchange data streams
  • provides sequencing and that data is delivered successfully
  • Message transfer from source to destination is in an ordered and error checking stream
  • Data segments are broken down into segments which the receiving computer reassembles
  • Verifies that all data has been sent through acknowledgments:
  • If a segment is missing, the receiving system requests them again
  • ACK/NACK, Three-way handshake
  • Both machines acknowledge each other's presence before sending items
  • Resides at layer 4 of OSI and TCP/IP suite models:
  • Some applications and their protocols require the error detection and the reliable/ordered delivery of packets provided by TCP-
  • Connectionless oriented protocol: UDP
  • Does not need an end-to-end connection
  • Does not provide data flow control
  • Minor packet loss can be tolerated and message transfer is one point to another without checking for order
  • Message transfer is one point to another without checking for order
  • Allows for minor packet loss, but does not provide security measures with communication
  • Speed is the importance
  • adds a UDP header to messages recited=ved from applications detailing source and destination port numbers
  • Can be a multicast or not
  • Efficient troubleshooting: if you encounter problems with web browsing, understanding http is used for web traffic allows you to focus on http-related issues
  • Better security: you can better identify and respond to security threats
  • effective network management: enables efficient network admin and troubleshooting

TCP Protocols

  • HTTP
  • Allows you to view websites using a web browser
  • Defines how data is formatted, transmitted and what actions web servers and browsers should take in response to various commands
  • Helpful to interact with the internet world
  • since it uses TCP, it is a connection-oriented protocol*

FTP Protcol

  • method of transferring data files from one computer to another over a network
  • most basic way of sending and receiving -Segments are transmitted into segments which the receiving computer reassembles as an exact copy of the original -connection oriented -performs auto error check

SMTP protocol

  • used for emails and attachments
  • connection oriented

Protocol ports

  • A port is a virtual path to send and receive data from computers
  • used to communicate between two different applications
  • part of tcp/ip networking
  • connected
  • network devices like computers and routers automatically manage network traffic using virtual ports
  • computers can have around 65,535 ports with some points having an assigned purpose
UDP Protocols
  • (connectionless)

Internet protocol (IP)

  • basis for addressing on all TCP/IP networks
  • connectionless-oriented
  • network layer of the OSI model
  • for devices to communicate. Over the network

SNMP Protocols

  • Connectionless
  • set of protocols to permit remote monitoring sand management of devices and hosts
  • set of protocols to permit remote monitoring sand management of devices and hosts,

Connectionless does not use three-way handshake, connected does

  • DNS
  • (Domain Name System)
  • matches a friendly name to its assigned IP address on the internet
  • Connectionless

Routing System

  • RIP
  • (Routing information protocol) - Uses broadcast UDP data packets to exchange routing information - for example, Cisco software sends routing information updates every 30 seconds which is called advertising Connectionless

Dynamic Host Configuration

  • DHCP
  • (Dynamic host configuration protocol)
  • protocol for automatically assigning dynamic IP addresses to devices on the network
  • dynamic addressing allows the device to have different IP addresses every time it connects to the network Connectionless

- Address Resolution protocol

  • ARP (address resolution protocol) uses for resolving (converting) Network Layer IP addresses into Data Link Layer addresses MAC
    • MAC never changes, the IP can change though. Allows a lot more security in assuring an item gets sent to the correct device
  • stays within the boundaries of a single network; is never routed across internetwork nodes/devices.
  • Request and reply protocol
  • Connectionless

Connectionless Protocol

  • does not use three-way handshake, connected does
  • IANA
  • (Internet Assigned Numbers Authority)
  • the organization responsible for maintaining official assignments of port numbers
  • for specific uses.

Three ranges:

  • well known (0-1023)
  • registered (1024-49151) (a company wants their service to be higher priority. Essentially the company has purchased that port)
  • dynamic to private or ephemeral ports (49152-65535

Unit 6: IP Addressing Fundamentals:

Radix is written as a subscript to a number

  • RADIX-WRITTEN AS A SUBSCRIPT TO A NUMBER
  • The radix is written as a subscript to a number.
  • in the number 250(10), the (10) in the subscript identifies the number system (decimal in this case) and identifies the quantity of Arabic numerals or symbols used in the system.
    • The radix is the base of the number system.

Examples:

  • Decimal: 250(10)
  • Binary: 11011(2)
  • Hexadecimal: 5DC(16)
  • The Radix says the number of values that can be used in the system.

PARTS OF A NUMBER

Least significant digit: LSD: is always furthest to the right Most significant digit: MSD: is always furthest to the left

  • In the number 3,286 (10), the 3 is the MSD because it represents three thousand. The 6 is the LSD because it represents only six.
  • Decimal: Decimal uses 10 digits with a base radix of 10
  • in order to increase a number in a decimal weighted table we multiply 10 by itself
  • Binary: binary only consists of 2 digits with a base radix of 2
  • Hexadecimal
  • The place-value of a digit is determined by its position in the number. In the decimal numbering system, the place value multiplies by the base as you move left and divides by the base as you move right. The same basic principles hold true in all numbering systems.

Unit 7: Wireless Networking

  • Wireless frequencies use wireless data to transmit and receive data through radio waves Devices can join more than one wireless network through radio waves
  • A wireless connection eliminates the need for wires to connect any device/system
  • Wireless connections are Flexible with low costs/provide high standards of service Broadcast at a much higher frequency than regular radio

Wireless Networking

When the radio frequency is applied to Wireless Access Point (WAP) antennas, an electromagnetic field is created which is then radiated throughout the area to be received by the user device.

Types of Wireless Networks:

Wireless wide area network
  • WWAN)
  • Wireless Wide Area Network provides a wide area networks can reach cities, regions and even cities Wireless networks connect to hotspot simply wireless through phone providers
Local Area Network
  • WLAN)
  • links two or more devices using a wireless distribution network in a limited area such as a home
  • Most modern WLANs are based on IEEE 802.11 standard, marketed under the Wi-Fi brand name support can range from 2 or more objects, but once the number of devices increases, the network becomes difficult to manage
  • repeaters or signal boosters to cover a vast geographical location SSID: wireless connections can be established to join the wireless network. The SSID is the name of the network
BSSID:

wireless wireless access identifies the access points and their identifiers, included in all wireless packets

provides

  • all the BSSs in the network, Wireless signals on an ESS are connected by a centralized distribution system Wireless AP broadcasts to reach network

Wireless Personal Area Network (WPAN):

provides wireless networks

Wireless Metropolitan Area Network (WMAN)

a range covered to 31 miles local Base Area Network (BAN) or local Campus Area Network (CAN) allowing multiple locations or buildings to maintain in connection within any metropolitan area

Hybrid wireless networks

hybrid networks rely on radio ore infrared lights to transmit data, easily attacked

Main network

the main purpose is to connect two independent and fully functional LAN nodes, networks Rely on wireless as well as wired signals a hybrid router transmits a Wi-Fi signal but also contains ports connected

- Wireless Ad Hoc Network

wireless networks that can sustain itself without any existing infrastructure a peer-to-peer network does not rely on wireless router or a central AP to transmit data from one point to another

The access point

the access point (AP) device is the most important device in a wireless network creates a Wireless Local Area Network (WLAN)

  • connects to a wired router or a switch via an Ethernet cable and transmits a Wi-Fi signal to a designated area
  • In Local Area Networks (LANs) and Wide Area Networks (WANs), a network node is a device that performs a specific function each node needs a MAC address for each Network Interface Card it possesses

Wireless advantages

  • Fast Mobility
  • quick set up
  • access points allows a wider reach of area to be connected

disadvantages:

  • Slower than wired networking when transferring files over a LAN
  • Performance worsens if you have a busy network or signal strength is weaker than optimal
  • reliability is a difficult due to limited channels available
  • limited Security with wirelss networks
  • Reduced management controls: easier to connect unsanctioned devices, consuming more bandwidth
  • Wireless networks are prone to interference depending on environment

Wireless Protocols:

  • Where Wi-Fi's two frequencies, *2.4GHz and 5GHz, * That's where Wi-Fi's two frequencies, 2.4GHz and 5GHz, come in. Wi-Fi can broadcast on both frequencies, helping its signal cut through all the noise and deliver a fast, strong signal from your wireless router to your device.
  • Access Points are an import part of any connectivity to networks enhances security and stops any unauthorized access provides high network security and flexibility for regular network usage
  • Autonomous Access Point Manage WLAN processes with no need for additional controllers or switches
  • It can connect on it's own
  • can connect to a typical wireless network
  • Lightweight Wireless Connections are known as controller access point connections for networks
  • -rogue access point are known as wireless hacking portals
  • installed on a secure network without a security password
  • poses a security threat
  • can allow access to a secure network for hacking and such

Unit 8: Wired and Wireless Media

  • Copper cable a, fiber, wireless transmissions
  • Copper Cable:
  • Twisted Pair: wires
  • Shielded (STP) or unshielded (UTP) wires create connections between computers and devices
  • STP cables have shielded wires
  • UTP do not have shielded wires
  • Eight insulated wires, separated into 4 different pairs Precise specifications govern the number of twists/braids per meter
  • UTP:
    • is implemented using inexpensive, modular telephone-type connectors

PIN

pin: layouts alpha and bravo three configurations:

  • Cable connections transmit pins on end of cable pins connecting (such as PC to a switch)
  • cabling from transmission through switches
  • transmission of relieve pins are swapped on opposite ends of the cable. Used to connect two like devices (pc to pc connections to computers,wireless)

Common console

  • the console port commonly referred to as for computer, used to connect computer. connects a series of cables
STP
  • combined shielding and twisting to prevent against signal degredation.
  • Reduces noise both within and outside the cable noise in the cable is referred to as “cross-talk" (info bleeding from one pair to another)
  • Fiber for cable connections Technology
  • Technology converts electrical signals into optical/light signals immune to all types of electromagnetic frequency monitoring (EMF) because there is no EM radiation

Types of Cable connection

  • Two types: Multi-Mode Fiber and Single-Mode Fiber. (MMF and SMF) multimode cable fibers that connect

  • cable allows 50-100 micrometers, larger core allows many modes, or paths, of light to propagat down the fiber.

Cable length

  • Supports longer segment lengths than twisted-pair wire, but shorter segment lengths than SMF Lights used on cables Light source is from LEDs

Single mode:

10 micrometers powered by some type of laser can handle much longer distances than multimode

  • Wireless transmissions for media network
  • no physical constraints
  • atmospheric conditions can affect wireless transmission
  • most used wireless media are light transmissions and radio waves
  • Light transmissions:
  • uses lasers to transmit and receive network signals requires a clear line of sight and precise alignment between devices offers some security due to them limited area form which signal can be monitored The cables transmit and uses radiowave

Radio waves:

  -  land based or space based
  • Originate from a land-based system and are transmitted to satellite then back down
  • The larger broadcast range of space-based transmissions, the more susceptible they are tp being monitored
  • radio waves for networking purposes are typically microwave frequencies in 1-20 gigahertz (GHz) range.

Signal for cable networks

  • transmission security is poor since carrier frequency is known and so are easy to monitor and/or jam
    • Example is a channel broadcast by a radio station

Transmission network

  • Example - transmits a signal across a broad frequency bandwidth and varies as the RF carrier frequency carries

Provides networks with increased power and transmission connection and connection to other systems

Advantages of wireless transmission:

  • Mobility easy transmission

  • relocatable

  • cable transmission is easy with wireless network setups

  • there is poor speed transmission Disadvantages of cable transmission are known for. Poor speed

  • cable speeds are quick, there is difficult set up process with cable set ups

Unit 9: Troubleshooting Methodology

Identify cables as the solution and try to address problems with the signal or cable length to fix Trying to address the symptoms without diagnosing the underlying cause can be dangerous. Obtain info from three different sources that connect for any signal problems:

  • Find all sources the network connects together through the following cable and wireless connections:
    • get info from user to find issues of network - computer in the form of logs and error messages for any network connectivity
    • personal observation if possible
  • Get and make a backup copy to restore network if needed
  • Establish a list of all the probable causes cable ports or networks List all causes, even if they are improbable
  • Prioritize from most to least likely
  • Test the cables through all possible reasons for network set up and try to narrow down cables
  • test the theory to see if it is the actual cause set up and test to make sure the network
  • Establish a plan of action to resolve the problem and implement the solution: cable connections or wireless transmissions

Test the plan steps

  • The plans can be simple or complex: transmission is easy with wireless networks

Check all wires and connections

Write the plan step-by-step and trace for any issues the network connection is the network connections right for: to get better network connections and signal strength

Test by: identifying when you know which network is being used

Identify the downtime is in good connection by knowing how to fix the cables and problems with network transmission

Create the connection by ensuring the network impact and good internet

Verify that the network connections and good, set up any needed connections and network connection

  • Document and show all findings in the network Testing new issues can sometimes introduce new problems, check and document

  • Root Cause Analysis (RCA with cable and wires): Check signal with device Unit 10: Specializing Tools

  • Hardware and network tools connection is vital

  • Set up tools

  • Crimped/crimping tool has proper power supply

  • secres cable ends connects to device through the use of application with mechanical preassure

  • Cable tester with the use of good connection

  • with good connections and proper connections for cable the device and signal can connect

  • displays function *& Loopback

  • loop cables test for signal connectivity Facilitate self check and internet connectivity for good network connection

  • punchdown tools are used for great signals

  • terminals wires that connects with block

  • aligns wire with a slot and pressed into place using the tool. wireless connecting tool Test cable for :

  • Optical time domain reflectometer for wire and wireless connections to run proper

  • checks for breaks in fiber optic cables by sending a signal and measuring the light is great for proper fiber optic light cable transmission and connectivity between devices

Establishes light connectivity, cable connection can estimate the signal that comes from the wire and connection

  • optical connection from light and to wire and connectivity
  • optical power lights Works in conjunction with an optical Leigh's source to measure the signal strength to detect/measure with fiber connectivity

Helps for better clarity for the power meters

-tone Generates connection fox with lights and light sources

Light that connect to cables and good source for light to the wire the connection

Cable provides clarity for tracing and with cable with intensity sounds or lights as the probe approaches the cable for connectivity

Better lighting connections provide strong signal for cable and ports connected

Aids technicians with identifying faulty components or sections within malfunctioning

  • better wireless connection that allows for strong connectivity
  • use great and and strong wires for better signal

Cable signal: measure voltage, resistance, and continuity Test ports to see that all connections are connecting properly

Software with easy use and set up for troubleshooting connectivity

Port Scanners: allows open, virtual and better network services in a host, crucial for great signal and great connection

Easy connection and secure assess by legitimate connectivity

  • protocol analyzer: provides great capture and analyses

Signal is transmitted with cables by providing to see the connection addresses and connectivity and speed connection

Great use for bandwidth for high speed transmission bandwidth speed tester: better internet connection with up and downward

  • samples files, calculating speeds in MBPS or KBPS - easy upload and download speed and capacity
  • results easily compared to great wifi signal transmission allows the use of great wifi signals:

Connectivity has better wireless signal

Helps better signal reception and high internet speed Allows better network, use

  • for connectivity issues using signal to great reach and connectivity strength with Echoes strong

  • Easy to setup great power cables to test connectivity for cable use, simple!

  • Internet is the great communication source for connectivity

  • Internet controls the connection quality in short: great quality connection and strength will increase

  • To trace and network from a destination you can send devices to

  • Cable is great source, device connectivity provides light and great sources

  • Results allows the cables and routers to have higher power and transmissions

  • Results shows that when connected great cables they have excellent and consistent with transmission

  • Easy and has quick power access and is very connectivity friendly!

  • Great connectivity and cable transmission:

  • Cable set up with connection domains Cables are great to get the Internet set up quick Quick and better set ups and configurations Access to better devices Set great display settings

  • set up with better local and foreign accessibility

  • Results show for wireless systems great internet and signals

Connectivity is better when the settings are great easy and quick to download internet

  • A connection that set great connectivity between to systems and makes MAC and internet connections

Better wire strength, better performance, better transmission Easy transmission through all networks, ports with greater connection speeds Better set up easier networks, connectivity with great power Better internet connections the faster the computer signal to connect to Wi-Fi Make sure Wi-Fi has strong signal and settings that will allow for the connection to be great! connectivity and strength! Connect better set up: easy to access The greater the power, the better connectivity transmission the easier to transmit through wireless connectivity with internet!

  • Great sources for connectivity tests and easy access internet - make a wireless environment better for your home or office to use by testing all source to ensure great reliability and easy connectivity for great use

Test is set up for the network

  • Is A device connection cable
  • A great internet cable test to ensure that everything is working great together and providing great power and connectivity
  • Ensure all ports are in place and not being moved to ensure that the cable stays in place!

Network monitoring

Good to set up better protection by having that connection and making sure that there is not to much interference

  • A great test that set up monitoring to protect networks from easy network connection to easy access is great!

  • Cable is a source of protection better set up for high connectivity and easy sources with great ports for better wireless transmission: set up great network for strong and better access

  • Aids from any unauthorized signal and access,

  • Helps build up internet strength A network scan should take quick if you connect the right signal!

  • NMS: Network monitoring systems: Is great for protection!

  • Has better cable connections and is easy to use Great with cables and set ups to protect from network breaches Great to ensure the power in right in place Helps identify what you were doing! Easy easy easy to use! Quick and secure and efficient for cables

    • Simple set up
  • Great for protection and protection use and high connectivity to stay high with power

  • Allows a great setting for devices for high use set to

Wireless connections also may need a good cable connection or will make the internet in an area easily accessible in certain spots and not be to use because the wireless connection is low

Test all internet spots to get the greater knowledge!

Cable and wireless strength can make all things connect in ways that provides: wireless network

  • cable setting great speeds for internet
  • Good and right amount of accessibility

Helps people provide and create great and working network setups and great system in place- Helps network connectivity! Network settings are highly important and can not take lightly! Great connection for all users Notify if anything is ever wrong or what can happen!

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser