used for troubleshooting a link where you suspect a high BER. contains both a pattern generator (which can generate a variety of bit patterns) and an error detector (which is synchronized with the pattern generator and can determine the number of bit errors), and it can calculate a BER for the tested transmission link.
a piece of test equipment typically used by telephone technicians. The clips on the butt set can connect a punch-down block (for example, a 66 block or a 110 block) connecting to a telephone. This allows the technician to check a line (for example, to determine whether a dial tone is present on the line or to determine whether a call can be placed from the line).
If you are working with existing cable and want to determine its category, or if you simply want to test the supported frequency range (and therefore data throughput) of a cable, you can use a _____.
can test the conductors in an Ethernet cable for continuity
can be used to attach a connector (for example, an RJ-45 connector) to the end of a UTP cable
Electrostatic Discharge Wrist Strap
if you have any static buildup in your body, the static flows to the object with a ground potential, to which your strap is clipped, thus avoiding damage to any electrical components you might touch
send an alert if the temperature in a room rises above or drops below administratively configured thresholds
Unauthorized access to patch panels and cables can be restricted using patch panel protector and cable tracks.
takes the transmit pins on an Ethernet connector and connects them to the receive pins, such that everything that is transmitted is received back on the interface
capture traffic flowing through a network switch, using the port mirroring feature of a switch
allows users to connect to view the routing information from that server's perspective. These are normally related to Border Gateway Protocol (BGP) routes.
System and Network Integrated Polling Software (SNIPS)
offers both web and command-line interfaces for monitoring network and system devices. Systems administrator can use the terminal or web interface to view reports in real time. The monitoring levels supported by _____ are: info, warning, error, and critical.
a network appliance that typically has multiple network interfaces and can generate high volumes of pseudo-random data
time domain reflectometer (TDR)
identifying exactly where the break exists in a long length of copper cable
optical time domain reflectometer (OTDR)
identifying exactly where the break exists in a long length of fiber-optic cable
Components of an SNMPv1 and SNMPv2c Network-Management Solution
runs a network management application. sometimes referred to as a network management system (NMS).
a piece of software that runs on a managed device (for example, a server, router, or switch).
Management Information Base (MIB)
Information about a managed device's resources and activity is defined by a series of objects. The structure of these management objects is defined by a managed device's MIB. Interfaces and their details (errors, utilization, discards, packet drops, resets, speed and duplex), system memory, utilization of bandwidth, storage, CPU, memory, and many other details are able to be monitored and reported via SNMP.
Defines an approach for user and group authentications (for example, SNMPv1, SNMPv2c, and SNMPv3).
Defines the type of security algorithm performed on SNMP packets. The three security levels discussed here are the following:
noAuthNoPriv (no authorization, no privacy)
uses community strings for authorization and does not use encryption to provide privacy.
authNoPriv (authorization, no privacy) :provides authorization using hashed message authentication code (HMAC) with message digest 5 (MD5) or Secure Hash Algorithm (SHA). However, no encryption is used.
authPriv (authorization, privacy)
offers HMAC MD5 or SHA authentication and provides privacy through encryption. Specifically, the encryption uses the Cipher Block Chaining (CBC) Data Encryption Standard (DES) (DES-56) algorithm.
Using hashing algorithms, SNMPv3 ensures that an SNMP message was not modified in transit.
Hashing allows SNMPv3 to validate the source of an SNMP message.
Using the CBC-DES (DES-56) encryption algorithm, SNMPv3 provides privacy for SNMP messages, making them unreadable by an attacker who might capture an SNMP packet.