Network Scope.1.2
Network Scope.1.2
Network Scope.1.2
CROSSTALK
Unwanted interference between 2 or more signals or channels, due to communication lines running
adjacent.
Types of crosstalk
Forward crosstalk- Refers to the unwanted interference or noise that occurs when a signal on one
channel or wire interferes with another channel which can disrupt data transmission or information.
Near-end crosstalk (NEXT)-Is a type of electromagnetic interference in which signals on nearby wires
interfere with each other in a cable.
Far end crosstalk (FEXT)- This is when signals on one cable interferes with signals on another cable
further away. It’s like hearing a conversation from a table across the restaurant instead of at the
neighbouring table.
Alien crosstalk (AXT)- This refers to when signals on one cable interfere with signals on a nearby
cable, like hearing a conversation from another restaurant in addition to the one you’re in.
CROSSTALK- This is a term used in various fields, including electronics, telecommunications and audio
engineering to describe unwanted interference between two or more signals or channels.
It occurs when signals traveling on adjacent conductors or channels interfere with each other.
Types of crosstalk:
-Near end crosstalk (NEXT)
-Far end crosstalk (FEXT)
-Alien Crosstalk (AXT)
-Power Sum Near end crosstalk (PSNEXT)
-Console cable -Is a type of cable that is used to connect a computer or other device to a network device
such as a router or switch.
Allows administrators and technicians to access the devices COMMAND LINE INTERFACE(CLI) for
configuration, troubleshooting and management purposes even if primary network is down or
misconfigured.
HOW TO PREVENT CROSSTALK
1. Proper cable management.
2. Twisted or Shielded cables.
3. Proper grounding.
4. Use shorter cables.
5. Separate cables.
CAUSES OF DATA LOSS OVER A NETWORK
Refers to the unintentional disappearance or corruption of digital information while its being transmitted
between devices.
Redundancy
Reliable hardware
Encryption
DATA LOSS OVER A NETWORK- this refers to the unintentional disappearance or corruption of digital information
while its being transmitted between devices or systems. This loss can happen due to various reasons:
Packet loss- This when digital data packets don’t arrive properly at their destination, causing gaps or errors in
transmitted information.
Network Disruptions – these are like unexpected roadblocks for your internet connection, causing sudden stops or
slowdowns in your online activities.
Latency- This is the delay between doing something online and seeing the response.
Hardware failures- This is when your computer or device stops working because something inside it broke or
stopped functioning.
Cyber-attacks- these are like digital break-ins whereby hackers try to get into your computer or online accounts to
steal information.
Software issues- These are problems in programmes that can mess up how things work on your computer or device.
NETWORK INSTABILITY
1. Network congestion:
• Cause- too much traffic on the network causing packets to be delayed or dropped.
• Solution-Regularly maintain and replace faulty hardware components.
2. Hardware failures:
• Cause: Malfunctioning network devices, such as routers, switches or cables can disrupt network
connectivity.
• Solution: Regularly maintain and replace faulty hardware components.
3.Software issues:
• Cause: Software bugs, or compatibility problems can lead to network instability.
• Solution: Update software, apply patches and review network configurations.
4.Lack of redundancy:
• Cause: Single points in network architecture can lead to instability if those components fail.
• Solution: Implement redundancy to ensure network strength
5.Environmental issues:
• Cause: issues such as temperature, humidity and physical obstructions can affect network
instability.
• Solution: Ensure proper environmental control.
(Online Assessment question: List hardware requirements for a network relying on 10Gb speeds. And list
their current hardware devices.)
2. regular backups
3. Regular updates
5. Segment Networks
6. Label everything
THREE CISCO MODES: (Name the three principal configuration modes of a cisco switch)
1.User EXEC mode. The User EXEC mode is the first mode a user has access to after logging in to
the switch. The user mode is identified by a greater than symbol following the switch name.
This mode provides access to the basic commands, including the show commands as well as
the system status commands. The switch cannot be configured or restarted from this mode.
2.Privileged EXEC mode. The Privileged EXEC mode includes all the commands that are available
in the User mode. Privileged mode supports configurations or restarts. It also allows the
user to view the system configuration file, restart the switch, and includes access to all
configuration commands.
3.Global EXEC mode. The Global Configuration mode allows users to make changes to the
router's global configuration settings, such as the hostname and the enable secret
password. This mode is accessed by entering the "configure terminal" command in
Privileged EXEC mode.
REMOTE ACCESS
Remote access enables remote users to access files and other system resources on any devices or servers that are
connected to the network at any time. Remote access is the ability of users to access a device or a network from any
location. With that access, users can manage files and data that are stored on a remote device. Some operating
systems include a remote access controller. For example, Windows uses Remote Desktop Protocol (RDP) and Linux
has Secure Socket Shell (SSH).
1: Network Failure.
2: Firewall Problems.
4: DNS Problems.
5: Insufficient permissions.
6: Capacity Exceeded.
7: Dropped connections.
8: CredSSP Problems.
https://www.techtarget.com/searchvirtualdesktop/tip/Top-5-remote-desktop-connectivity-problems-and-how-
to-prevent-them
VPN ACCESS
A virtual private network (VPN) is like a secret tunnel that keeps your internet connection private and secure. It
makes your online activities harder to see and helps you access websites from different places.
1.Remote Access VPN- This type of VPN allows individual users to connect to a private network from a remote
location, such as their home or a coffee shop. It’s commonly used to ensure a secure connection for remote workers
or travellers.
2. Site to site- Connects entire networks together, such as two branch offices of a company located in different
cities.it allows these networks to securely communicate with each other over the internet as if they were in the
same physical location.
IP ADDRESS PARAMETERS
1. IP Address
2. Subnet mask
3. 32-bit Address
4. Quality of service
5. Proxy settings
6. DHCP configuration
7. Firewall settings.
IP ADDRESS CONFLICT
This conflict happens when two devices on a network get confused because they’re using the same
“address” to identify themselves. It’s like two houses having the same street address- things get mixed up
and might not end going where it’s supposed to.
CAUSES OF IP ADDRESS CONFLICT:
Manual configuration errors
• DHCP Server issues- misconfigured DHCP server might assign same IP address to multiple devices.
• Rogue DHCP servers -Unauthorized DHCP servers on a network can cause conflicting IP addresses.
• Device cloning -If a device is cloned and copied without changing its IP address it will conflict with
the original device.
PREVENTION METHODS
. Proper network management practices.
. Regular maintenance of IP assignments
. Use of DHCP as it automatically assigns IP address to devices on your network.
. Subnetting-Divides your network into smaller subnets if you have many devices, this reduces the
number of devices sharing the same space and lowers risk of conflicts.
IP ADDRESS CONFLICT
IP address conflict is a situation in which two or more devices within a network are configured with the
same IP address which results in communication problems and network disruptions. These conflicts arise
due to IP issues, DHCP server issues resulting in network instability problems or delay of packets.
Causes:
1.Rogue DHCP server: Unauthorized DHCP servers on the network can allocate IP addresses and causes
conflict if they are not properly managed or identified.
2.Network changes: Adding new devices or configuring the network can sometimes result in IP address
conflict in devices that aren’t updates with the current IP information
3.Device cloning: By assigning identical IP addresses to both the original and cloned device (duplication of
hardware or software) on the network, it causes disruption, difficulty in resolution and operational impact.
4.Static assignment errors: Manually assigning IP addresses to devices and making a mistake such as
assigning the same IP to two different devices.
5.Network segment changes: If devices are moved between different network segments or subnet mask
without updating their IP configurations, conflict might occur.
Trusted Certificate
A trusted certificate is recognized by browsers and systems as issued by reliable source, indicating a
secure and verified connection.
DOMAIN NAME SYSTEM(DNS)
DNS. Auto main name system. Is a vital component Of the Internet It translates human
readable domain names into IP addresses. it plays a crucial role in enabling users to access
websites and services seamlessly.
1. Use redundant DNS servers: Employing multiple DNS service provides redundancy. Which
ensures continued service availability. In case of any server failures.
2. DNS caching: DNS caching helps improve resolution and speed the load on the DNS
servers by storing previously resolved domain information.
3. Educating users: User education is vital to prevent issues related to misconfigured DNS
settings. As it emphasises the importance of configuring DNS parameters correctly.
4. Implementing the DNSSEC: DNS Security extensions Enhance security by validating the
authenticity of DNS data, protecting against cache poisoning and other threats.
UNTRUSTED CERTIFICATES.
Digital certificates that are not recognized as trustworthy by user’s web browser or application. These
certificates can impose security risks and when encountered they typically trigger warning or errors.
TYPES OF CERTFIFICATES:
Self- signed certificates – These certificates are not issued by CA; they are not issued by CA they are
generated and signed by the entity self.
Expire certificates – When a certificate expires, it is not longer considered trustworthy and connections
using the expired will result in warning or errors.
Revoked certificates – A certificate may be revoked by issuing Certificates Authority (CA) before its
expiration date due to compromise or other security concerns.
TRUSTED CERTIFICATES
These certificates are signed by using a recognised and trusted Certificate Authority (CA). These certificates
are wildly accepted and trusted by web browsers, operating systems and applications and they play a
critical role in establishing secure and trusted online connections.
TYPES
➢ Issued by a trusted certificate authority.
➢ Valid & Current: these certificates have not expired.
➢ Correct hostname
- For most packets the value in the Protocol field will indicate a Transmission Control
Protocol (TCP/6) segment or a User Datagram Protocol (UDP/17) datagram.
- The values assigned to protocols (TCP 6& 17 for UDP) are managed by IANA.
DiffServ Field- The Differentiated Services Code Point (DSCP) field is used to indicate a
priority value for the packet.
-This can be used with class of service (Cos) and quality of service (QOS) mechanisms to
facilitate a better quality of real time data transfers, such as video streaming or Voice over IP
calling.
-The 6-byte DSCP value can be combined with a 2-byte Explicit Congestion Notification
(ECN).
Time To Live field- The time to live field IP header is decreased by at least 1. this could be
greater if the router is congested.
✓ -The TTL is normally the number of seconds a packet can stay on the network before
being discarded.
✓ While TTL is defined as a unit of time(seconds), In practice. It is interpreted as a
maximum hop count.
✓ When TTL is 0 the packet is discarded. This prevents badly addressed packets from
permanently circulating the network.
PING TEST
• Ping the device to a look back address to test full functionality of TCP\IP.
• Ping another computer within that network and if this fails the switch is most likely to have a
problem.
• Ping another device within the same subnet and if this fails the issue lies within the gateway.