Network + Part 10

  1. Attenuation
    Signal strength diminishes over distance either through a physical or wireless connection.
  2. Decibels (dB)
    Signal strength ratio measurements. One tenth of a bel.
  3. EMI
    Electromagnetic interference. Can come from any electrical device.
  4. Interface Errors
    When the port itself is bad.
  5. Short Circuit
    When 2 wires that are not supposed to touch connect. Can happen inside of a cable.
  6. Open Circuit
    Open Circuit
  7. Transceiver types need to match. Single to single. Multi to Multi. The wavelength also needs to match 850nm and can’t be used with 1100mn.
    Transceiver types need to match. Single to single. Multi to Multi. The wavelength also needs to match 850nm and can’t be used with 1100mn.

    Duplex must match. Either side much have half or full duplex
  8. Cable Crimpers
    Pinch the connector into the wire.
  9. Punch down tool
    For punching a wire into a 66 or 110 block.
  10. Tone Generator
    Put a tone on the wire. A probe is used to identify where the other end of the wire is located.
  11. Loopback plug
    Useful for testing physical ports. You can transmit and receive a data stream and check if there are errors on that device.
  12. TDR
    Time Domain Reflector. Estimate cable lengths. Identify splice locations. Signal loss. Certify cable installations. Locate breaks. Used for copper. Sends an electrical pulse similar to a radar ping.
  13. OTDR
    Optical Time Domain Reflector. Estimate cable lengths. Identify splice locations. Signal loss. Certify cable installations. Locate breaks. Used for fiber. Sends a light pulse similar to a radar ping.
  14. Multimeter
    Checks AC voltage. Checks DC voltage inside computers.
  15. Cable Tester
    Checks if your copper wire is fully functional. Check each individual pins.
  16. Taps and Port Mirrors
    Intercept network traffic either with a physical device or setting up a port on a switch.
  17. Fusion Splicer
    Joins the ends of fiber together. Uses Heat.
  18. Light meter
    Measures how much light is going through the fiber optic cable. Sends a laser or LED on one end and another device on the other end picks it up.
  19. Spectrum Analyzer
    Check the frequencies in the area. Useful for changing wifi channels.
  20. Wireless packet analysis
    Available for free on wireshark.
  21. Protocol Analyzers
    Gathers frames on the network and view traffic patterns.
  22. Speed Test
    Test the bandwidth.
  23. IP and port scanners
    Scan for IP addresses and open ports. Can help you pick an available IP address. Visually maps the network. Useful for rouge system detection.
  24. Netflow
    Gathers traffic statistics from all traffic flows. Sends a probe to watch communication.
  25. TFTP server
    Trivial File Transfer Protocol server. For initial file transfers and firmware upgrades.
  26. RSSI
    Received Signal Strength Indication. The strength of the received radio signal. dBm decibal milliwatts. The closer to zero is better. 50 dBm is excellent. 70 is ok. 80 is low.
  27. EIRP
    Effective isotropic radiated power. The radiated signal strength from the transceiver.
  28. Omnidirectional antennas
    Bunny ears. Signals are evenly distributed on all sides.
  29. Directional antennas
    Focus the signal for increased distance. Sends and receives in a single direction.
  30. Yagi antenna
    Directional antenna that looks like a tree triangle.
  31. Parabolic antenna
    Directional antenna that looks like a C with a stick in the middle.
  32. Polarization
    The orientation of the antenna is relative to the surface of the earth. When setting up 2 directional antennas they must face each other.
  33. AP association time
    Devices must associate with an access point. This can occur multiple times as a device roams. Determined by signal strength.
  34. Channel utilization
    Too many people using 1 access point.
  35. Site Survey
    Determine the existing wireless landscape and identify existing access points. Helps work around existing frequencies. Similar to heat maps.
  36. Overlapping channels.
    When 2 or more access points use the same channel. Recommend we use channels 1 , 6 , 11.
  37. Routing Tables
    Digital phonebook. Shows how to get from point A to point B.
  38. Collisions may occur if 1 device is set for half duplex and another for full duplex.
    Collisions may occur if 1 device is set for half duplex and another for full duplex.
  39. Broadcast storm
    Some processes use broadcasts to communicate. A device will send a signal to every other device on the VLAN. Each device will process that broadcast and it will impact performance. You can use packet capture to check how many broadcasts are in the network.
  40. Duplicate MAC address
    May be an attack or a manufacturing error. Virtual machines also create MAC addresses. 2 MAC addresses will interfere with ARP.
  41. Duplicate IP address
    Static IP address assigned to more than one machine. OS checks if this happens.
  42. Multicast flooding
    Used for one-to-many traffic flows such as video feeds. Switches may forward this unnecessary traffic to every computer on the network.
  43. IGMP snooping
    Internet Group Management Protocol. Hosts and routers use IGMP to direct multicast transmissions. Switches can also watch for these messages and direct them to the correct device.
  44. Asymmetric Routes
    Ingress flows on one path and egress flows on another path.
  45. Switching Loops
    Happens when Spanning Tree Protocol is not configured. Switches communicate by MAC address, and they can end up sending traffic to each other, back and forth.
  46. Routing Loops
    • Router A thinks the next best hop is router B.
    • Router B thinks the next best hop is router A.
    • This repeats until the TTL expires. Using a traceroute can find out if this is happening. Solved my modifying the routing tables.
  47. Missing Route
    A route to the destination network does not exist and the packet is dropped. ICMP host unreachable message will be sent to the source device.
  48. Rouge DHCP Server
    IP address assigned by a non-authorized server. Client is designed a duplicate or invalid IP address. Prevented by DHCP snooping. Active Directory can identify legit servers. Renewing IP leases also works.
  49. Exhausted DHCP scope
    Client receives an APIPA since the number of IP addresses has been depleted. They will only be able to communicate with the local subnet. Lowering the lease time can help.
  50. A
    A
Author
dsagent
ID
363255
Card Set
Network + Part 10
Description
Wired Network Troubleshooting Hardware Tools Software Tools Wireless troubleshooting Common Wireless Issues Common Network Issues
Updated