course|notes™ quick reference guide Network+ Guide to Networks, 8th Edition Welcome to Network+ Guide to Networks The CompTIA Network+ (N10-007) exam tests a student’s knowledge and skills needed to manage, troubleshoot, and configure a wired and wireless network. Successful candidates must understand basic network design and technologies, including network limitations and weaknesses. Network professionals must be able to maintain documentation, configure network devices and protocols, and manage security. In addition, the candidate should be familiar with enterprise technologies including virtualization, cloud computing, and mobile devices. Networking Concepts Network Infrastructure Network Operations VLAN 1 Trunk lines with traffic for VLAN 1, VLAN 2, and VLAN 3 Access ports Trunk ports VLAN 2 NETWORK ­Troubleshooting and Tools VLAN 1 Switch A Router Network ­Security Switch C Trunk line with traffic for VLAN 1, VLAN 2, and VLAN 3 Trunk ports Switch B VLAN 3 Access ports What’s new in the CompTIA Network+ (N10-007) certification exam? • • • • More emphasis on virtualization, cloud computing, remote access, and security Focus on practical skills, as well as Data link layer and Network layer technologies More coverage of emerging technologies such as IoT, NFC, and Ant+ Removal of legacy technologies 69378_isrt_ptg01_hires.indd 1 07/05/18 2:59 pm Networking Concepts IP Addressing IPv4 and IPv6 addresses are used to identify computers and networks. IPv4 addresses are 32-bit dotted decimal numbers and are categorized by classes based on the value of the first octet as in the following table: Networks are composed of many pieces that must all work together for proper operation. A network administrator must understand the components of a network including network protocols and ­addresses, network topologies and technologies, wired and wireless networks, and a variety of network services, including cloud services. An essential tool for bringing these many pieces together is the OSI model, which breaks network operations down into seven layers, explaining the role of each component and its interaction with other network components. The OSI model describes a seven-layer approach to networking from how applications should access network services to how bits are transmitted and received on the physical media. The seven layers and the job each layer performs are described in the following table: Application (7) Presentation (6) Session (5) Transport (4) Network (3) Data Link (2) Physical (1) Description Devices and Protocols Provides network services to applications Translates data formats, encryption, and compression Maintains connections between systems Transfers data between applications; reliability, and flow control Provides logical addressing and routing Provides physical addressing, frame formatting, and error detection Transmits and receives bits across the media DNS, DHCP, HTTP, FTP, and File sharing ASCII, EBCDIC, JPEG, TIF, and RDP First Octet Default Subnet Mask Hosts per Network A B C 0-127 128-191 192-223 255.0.0.0 255.255.0.0 255.255.255.0 16,277,214 65,534 254 Class D addresses are used for multicast applications and have a first-octet value of 224-239. Class E addresses are reserved for experimental use and have a first-octet value of 240-255. IPv4 addresses can be public or private. Private IP addresses can be used on any network but public IP addresses are issued by IANA and are used for Internet access. Users of private addresses must use NAT/PAT to gain access to the public Internet. IPv6 addresses are 128 bit numbers divided into 8 groups of 16 bits expressed as hexadecimal digits, for example: FE80:1234:5678:9ABC:DEF0:F00D:BEEF OSI Model Layer Name (Number) Class TCP and UDP Well-Known Ports TCP/IP network applications communicate using Transport layer protocol port numbers. TCP is a connection-oriented Transport layer protocol and uses a three-way handshake to establish a connection between two applications before data is transferred. UDP is a connectionless transport layer protocol that means that data is transferred between the applications without the requirement for a connection to be established. To configure and troubleshoot network communication, you should know the most commonly used port numbers. Login/logout, SQL, and NFS TCP and UDP IP, ICMP, ARP, and routers Ethernet, Frame Relay, ATM, switches, and NICs Cables, connectors, and hubs Network Topologies A network’s topology describes how devices are physically connected (physical topology) and how data moves from one device to another (logical topology). • Star—All devices are connected to a central device such as a switch. The most common topology used in LANs. • Ring—Data is passed along from one device to another in a ring formation. Token Ring and FDDI are common ring ­topologies. • Bus—Devices are connected by a length of cable, usually in daisy-chain fashion. A bus is sometimes used as a network backbone, connecting multiple network segments together. • Mesh—Most often used in WANs or WLANs, devices are ­connected to multiple other devices. Port # Application Transport Layer Protocol 20, 21 22 23 25 53 67, 68 69 80, 443 110 143 161 389 445 3389 FTP SSH Telnet SMTP DNS DHCP TFTP HTTP, HTTPS POP IMAP SNMP LDAP SMB RDP TCP TCP TCP TCP UDP UDP UDP TCP TCP TCP UDP TCP TCP TCP Configuring a WLAN Wireless LANs (WLANs) are an integral part of most wired networks, allowing mobile users access to a network without being tethered to a cable. There are five common 802.11 (Wi-Fi) standards as listed in the following table: Routing Routing moves packets from one network to another until the ­packet reaches the destination network. Routers work with IP ­addresses to determine the best path. Dynamic routing information is learned using routing protocols: • RIPv2, EIGRP—Distance vector routing protocols for small to medium-size private internetworks. • OSPF—A link-state routing protocol used for larger private internetworks. • BGP—A hybrid protocol used for Internet routing. Wi-Fi 802.11 Standards Standard Frequency Band Maximum Speed 802.11a 802.11b 802.11g 802.11n 802.11ac 5 GHz 2.4 GHz 2.4 GHz 2.4 or 5 GHz 5 GHz 54 Mbps 11 Mbps 54 Mbps 600 Mbps 6.93 Gbps Terms and components associated with Wi-Fi networks include: • Antenna—Antennas transmit and receive data and can be ­omnidirectional or unidirectional. • Channels—The range of frequencies on which a device transmits data. 2.4 GHz standards use 11 or 14 channels and 5 GHz standards use up to 25 channels. • Service set identifier (SSID)—The name of a WLAN; used by clients to connect to the network. Switching Switching moves data from one device to another. A switch ­receives incoming data from one of its ports and redirects it to one or more outgoing ports based on the destination MAC address. Switches can be configured to work with routers by using VLANs and trunking protocols such as 802.1q. 2 69378_isrt_ptg01_hires.indd 2 07/05/18 2:59 pm Network Infrastructure Virtualization Virtualization is a process that creates a software environment to emulate a computer’s hardware, BIOS, and networking components, allowing multiple virtual machines (VMs) to run on one physical computer and communicate across a virtual network. Some of the components of virtualization include: • Hypervisor—Creates and monitors the virtual hardware environment, allowing multiple VMs to share physical resources. A hypervisor can be type 1 or type 2. Type 1 hypervisors are used on production servers and run directly on the server hardware whereas type 2 hypervisors run on top of the host operating system and are most often used in testing and development environments. • Virtual switch—A network switch implemented within the hypervisor host. • Virtual NIC—A software implementation of a network interface card attached to a virtual machine. A virtual NIC connects to a virtual switch. • Virtual router/firewall—Software implementations of the hardware devices that allow secure communication between virtual networks and the virtual network and physical network. The infrastructure of a network is built upon the network devices used to connect computers; the media types used to make network connections; and the underlying network technologies, protocols, and topologies that make everything work together. Network+ candidates must know how network devices work and how data is moved from one device to another and from one network to another. They must be familiar with network cabling, Ethernet standards, virtualization, network storage, and how and where to use the network devices that communicate within and between LANs. Network Cabling Network cabling makes physical connections between network devices. Media types include copper and fiber-optic. • Copper cables—Includes coaxial and twisted-pair cabling. Coax cable types: RG-59 and RG-6. Twisted pair types: Cat3 through Cat7, can be shielded or unshielded, and can be PVC or plenum-rated. Connectors include RJ-11 and RJ-45 for UTP and BNC and F-type for coaxial. 110 blocks and 66 blocks are termination panels. Copper cables are terminated using the 568A or 568B wiring standard. • Fiber cables—Made of thin strands of glass, varieties include single-mode fiber (SMF) for longer distances using lasers and multimode fiber (MMF) for shorter distances using LEDs. Connectors include ST, LC, SC, and MTRJ. VM1 vNIC 1 VM2 vNIC 2 VM3 VM4 vNIC 3 vNIC 4 Host machine Ethernet Standards The base standard for Ethernet is IEEE 802.3 but there are many sections of the IEEE 802.3 standard that define operating details such as bandwidth and type of cabling. These standards are specified using the XBaseY naming convention, where X is the bandwidth rating, Base means baseband communication, and Y is the type of cabling used. Ethernet over twisted-pair cabling has a maximum segment length of 100 meters. Some fiber optic implementations can have segments up to 25 miles in length. Some of the most common XBaseY standards are described below: • 100BaseT—100 Mbps Ethernet over twisted-pair cabling. • 1000BaseT—1 Gbps Ethernet over twisted-pair cabling. • 10GBaseT—10 Gbps Ethernet over twisted-pair cabling. • 1000BaseLX—1 Gbps Ethernet over single-mode or multimode fiber. Up to 5000 meters. • 1000BaseSX—1 Gbps Ethernet over multimode fiber. Up to 500 meters. Virtual switch Hypervisor Physical NIC 1 Physical NIC 2 To physical network Network Storage There are two primary types of network storage used by both physical and virtual devices: • Storage Area Network (SAN)—Storage that uses a dedicated network connection, typically Fibre Channel, FCoE, iSCSI, or InfiniBand to connect computers directly to storage devices. • Network Attached Storage (NAS)—Shared storage accessible via the same network as the storage client. Uses standard file sharing protocols such as SMB and NFS. Network Devices WAN Technologies Network devices pass data from one device to another or from one network to another to get the data to its final destination; sometimes performing complex filtering and processing of data packets before they are forwarded. Some of the most common devices and their functions include: • Router—Manages traffic between two or more networks; ­forwards packets based on the network ID of the destination IP address. • Switch—Forwards data frames between devices based on MAC address. • Hub—Receives bit-level signals on one port and repeats the signals out all other ports. • Firewall—Performs routing functions and specialized filtering to block certain types of traffic based on IP addresses, ports, and packet contents. • Wireless access point—Accepts wireless signals from wireless clients and retransmits to the rest of the network. Used in an infrastructure mode wireless network. Advanced networking devices include multilayer switch, IDS/IPS, content filter, load balancer, proxy server, VoIP gateway and PBX, VPN concentrator, and RADIUS server. WAN technologies connect LANs together over long distances, primarily work at the Data Link layer, and include: • Frame relay—Uses packet-switching over SVCs or PVCs. • Leased line—Includes T1, T3, and OC-3 through OC-192 signaling rates. • MPLS—Carries multiple Layer 3 protocols over packetswitched networks using labels for routing and prioritization. • ATM—Uses fixed 53-byte packets called cells over virtual circuits. Other wired WAN technologies include ISDN, DSL, and Metro Ethernet; wireless WANs include WiMax, GSM/CDMA, LTE/4G, and satellite. WAN connections to the local network occur at the demarcation point and typically involve a smart jack and a CSU/DSU. Demarcation point Main office Demarcation point CSU/DSU CSU/DSU CSU/DSU with multiplexer CSU/DSU with multiplexer Customer responsibility Smart jack Smart jack Telco responsibility Branch office Customer responsibility 3 69378_isrt_ptg01_hires.indd 4 07/05/18 6:54 pm Network Operations Disaster recovery is the ability of a network to maintain operations in the event of a major disaster such as fire, flood, or extended power or network outage. Disaster recovery may involve these components: • Cold site—An alternate location where equipment and data can be moved and service restored within several days. • Warm site—An alternate location that is provisioned with some equipment and data, usually only requiring minor setup and data restoration before operations can be resumed; usually within a day. • Hot site—A fully operational alternate location with current data where service can be resumed within minutes or hours. • Backups—An integral component of a disaster recovery plan where data is backed up to an external media such as tapes or external drives. Types of backups include full, differential, and incremental. A snapshot is a type of backup where a copy of data or an entire system is made so the system can be fully restored back to the moment in time the snapshot was taken. Network administrators have a variety of tools, processes, and technologies available to help ensure a reliable and high-performance network. Network documentation makes troubleshooting and scaling a network easier through the use of diagrams, inventory management, labeling, and device configuration documentation and performance baselines. Network uptime is critical and high availability and disaster recovery must be a part of every network plan. In addition, network documentation must include the identification and execution of network policies and best practices. Network Documentation Network documentation includes both physical and logical network diagrams. Physical diagrams show the location of devices and cabling whereas logical diagrams show the overall network topology and logical addressing scheme. Standard symbols are used to indicate types of devices as in the following figure: Wireless access point Scanning and Monitoring A network administrator must continually monitor the network and its devices to ensure optimal operating conditions while also scanning for security vulnerabilities to prevent attacks. Some of the components and processes involved in this undertaking include: • Log reviewing—Most network devices and operating systems generate notifications and alerts of events that have been detected. Network and security devices usually send notifications to a Syslog server or a SIEM service, while Windows OSs use the Event Viewer. • SNMP monitoring—A TCP/IP based protocol used to collect performance metrics from multiple devices and send the data to a network management system for analysis and display. SNMP runs over UDP ports 161 and 162. SNMPv3 adds authentication and encryption for increased security. SNMP uses a Management Information Base (MIB) to store data gathered from network management agents. • Patch management—Network devices and OSs must be continually updated to fix bugs and vulnerabilities. A patch management system provides automatic updates and reporting to ensure all systems are up-to-date. Laptop Web server Internet Firewall Router Switch File server Printer Switch Workstation Additional types of documentation should include: • Rack diagrams—Show representations of physical devices such as routers, switches, and servers and their placement and connections in a standard equipment rack. • MDF/IDF documentation—The MDF is where a WAN provider’s connection is installed and serves as the interconnect between the IDFs. An IDF is where devices connect to patch panels and switches. Usually one or more IDFs per floor connect to the MDF. • Performance baselines—Include the percent utilization of the network, error statistics, CPU utilization on key servers, network service usage, and so forth. Baselines can be used to detect bottlenecks and malfunctioning devices. • Change management—Documents additions, removals, and configuration changes made to network devices and cabling. • Network configuration—Contains device type, model, and configuration details. Analyzing Metrics After data is collected from a network, many performance values must be analyzed to determine the network’s health. Network administrators often create a baseline that includes the percent utilization of the network, error statistics, CPU utilization on key servers, network service usage, and so forth. Baselines can be used to detect bottlenecks and malfunctioning devices. Error statistics might include the following: • Discarded packets—Packets that are discarded, or dropped, by the receiving device because the device was too busy, the packet was no longer relevant or had an error. • Error packets—Packets that are too small (runts), too large ­(giants), continually retransmit (jabber), or anomalous (ghosts). • Utilization and throughput—Measures what percentage of the network and computing bandwidth is being used and the amount of data that passes through the network in a given time period. Business Continuity and Disaster Recovery Business continuity depends on a business’s ability to ensure its network’s high availability. High availability typically involves: • Fault tolerance—The ability for a device to continue to operate after a component failure. • Load balancing—The ability to use two or more of the same devices or media pathways to share the processing or network traffic load. • NIC teaming—The use of two or more NICs in a single computer, with the NICs working together to provide increased bandwidth and fault tolerance. • Port aggregation—Two or more ports on a switch that are bonded together to provide higher bandwidth. • Clustering—Two or more servers working together to provide load balancing and fault tolerance. • Battery backup/UPS—The use of a battery backup and uninterruptible power supply (UPS) to provide power to a network device in the event of a power failure. Remote Access Most networks have provisions for users to access the network while working from home or while traveling. A number of remote access methods exist, with the most common being virtual private network (VPN). A VPN provides secure client-to-site or site-tosite communication using authentication and encryption. Common VPN protocols include IPSec, PPTP, and SSL. Other remote ­access protocols include remote desktop protocol (RDP), virtual network computing (VNC), SSH, and Telnet. 4 69378_isrt_ptg01_hires.indd 5 07/05/18 6:56 pm Network Security Access controls may include one or more of the following: • 802.1X—Also known as EAPoL, a port-based mechanism used to control access to wired or wireless clients by restricting ­access to the AP or switch port to only authenticated devices. • NAC—A policy-driven system used to determine the level and type of access granted to a device such as firewalls, routers, and switches. • Access control lists—A list of rules configured on a device that permits or denies traffic based on source and destination ­address, and network protocol. A lot of time is spent configuring a network to ensure that authorized users have access to network resources; perhaps more important is ensuring that unauthorized persons do not have access to the network. Network security is of paramount importance because so much important data is kept on networks, from social security numbers, to credit card information, to private health data. Network security involves concepts such as disaster recovery, encryption protocols, attacks and threats, malware, access controls, and physical security. A network technician’s understanding of security risks and countermeasures is of utmost importance on both wired and wireless networks. Wireless Security Wireless security requires special considerations because, unlike wired media, the network signals are unbounded and can therefore be captured by anybody with the appropriate radio receiver. To mitigate the problem, wireless networks should always be encrypted and may also require user or device authentication. Wireless encryption and authentication methods include: • WPA2—The strongest encryption standard; uses the AES or AES-CCMP encryption algorithm. WPA2-Enterprise or WPA2802.1X requires an authentication server. • WPA—Less secure than WPA2; uses TKIP-RC4 for ­encryption. • EAP (Extensible Authentication Protocol)— A framework for authentication protocols that use authentication and encryption. Common EAP variants include EAP-TLS, EAPoL, EAP-FAST, and PEAP. EAP can be used with smart cards, biometrics, and traditional username/password authentication methods. • MAC Filtering—A method that restricts access to the wireless network to devices with specific MAC addresses. Since MAC addresses can be spoofed, it should not be used as the sole security method. Physical Security If someone has physical access to a device, it is not secure. ­Network devices and servers must be installed in a secure location with strict rules governing who has access to the location, and with well-defined procedures for enforcing those rules and detecting if a breach has occurred. To summarize: the two tenets of physical security are prevention and detection. Common prevention methods include: • Badges and Smart cards—A security badge may simply contain information a security guard can use to verify a person’s identify, such as a photo, name, and title. Most, however, are smart cards that have digital data encoded on them that specifies which doors a person can open by swiping the card through a reader or by using a proximity sensor. • Biometrics—Biometric sensors authenticate a person using unique traits such as fingerprint, iris pattern, or facial recognition. • Key fob—A small handheld device, often placed on a key ring that contains identifying and access information for a user. In the event of a security breach or attempted breach, detection methods must be in place: • Motion detection—Detects movement in a room or ­ outdoor space that can generate an alarm, notification, or ­countermeasures. • Video surveillance—Creates a video log of all activity for ­real-time monitoring or archival purposes. • Asset tracking tags—Small tags placed on items that generate a signal that can be picked up by a reader when an item enters or exits a room or building. • Tamper detection—Detects whether a device has been physically opened or otherwise tampered with. Common Network Attacks Networks face varied and numerous threats from hackers and malware. Network administrators must know what threats they face to properly secure a network. Some of the more common network attacks include the following: • Denial of service (DoS)—A network attack that attempts to prevent legitimate users from accessing a network or service; usually works by consuming excessive network or server resources. A distributed DoS (DDoS) is a coordinated attack that comes from multiple sources. Distributed reflective DoS (DRDoS) attacks use spoofing to hide the source identity. • Brute force—An attempt to guess a password or encryption key using numerous character combinations. • Social engineering—An attack that uses a person’s trust or naiveté to gain access to a system. • Man-in-the-middle—An attack that captures secure transmissions between two parties without either party’s knowledge. • Ransomware—A program that locks a user’s data or computer system until a ransom is paid. • DNS poisoning—An attack in which the hacker redirects traffic to the attacker’s web server by altering DNS records. Authentication and Access Controls System and data security is founded on two components: ­Authentication verifies someone’s identity and access controls allow or deny an authenticated user access to a system or data. There are a variety of authentication methods including: • Kerberos—Used with Windows Active Directory and supported on other systems, it uses the concept of keys to validate identity and tickets to grant access. • RADIUS—A centralized authentication, authorization, and accounting (AAA) service commonly used for remote access, wireless networks, and network device access. • TACACS+—Another AAA service, developed by Cisco, typically used for network device access control. • Certificates—A digital document that contains identifying information and usually an encryption key for identity verification and secure communication. Commonly used by HTTPS and SSL in a public key infrastructure (PKI). • Multifactor authentication (MFA)—Combines two or more authentication methods, such as a user name plus password and biometrics. Network Device Hardening Network hardening attempts to reduce network and system vulnerabilities, thereby stopping or detecting attacks before they are exploited. Some technologies and techniques for network hardening include: • Anti-malware software—Install software that detects and sometimes removes malware such as viruses, worms, rootkits, spyware, and adware. • Credentials—Change default administrator credentials on OSs and network devices. Use strong passwords. • Software updates—Keep software and device firmware up-todate and apply patches in a timely manner. • Services and ports—Disable unnecessary network services and TCP/UDP ports. Disable unused physical switch and router ports. 5 69378_isrt_ptg01_hires.indd 7 07/05/18 6:57 pm Network Troubleshooting and Tools • • Troubleshooting a network is as much an art as it is a science. There is no substitute for practice and experience, but there is a methodology you should follow that will help with troubleshooting not only networks, but most problems you encounter in life. In addition, you need to be familiar with the various tools, both software and hardware, that are commonly used to troubleshoot networks. The successful network troubleshooter will draw upon a variety of skills, technologies, and techniques to solve the problems encountered on increasingly complex LANs and internetworks. Troubleshoot Wireless Connections Wireless networks pose unique problems compared to wired networks since there is no tangible media to inspect and test. Some of the more common problems and wireless signal characteristics that can affect signal quality include: • Interference—Signal quality can be adversely affected by other radio signals using the same frequencies as a WLAN. • Overlapping channels—Nearby WLANs using the same or adjacent channels degrade signal quality. • Power level—The transmitter power can be increased or ­decreased to provide the best wireless signal coverage. • Rogue access point—An unauthorized access point (AP) can degrade signal quality or pose as a valid AP to steal data or gain unauthorized access to another network. • Antenna type—Using the proper antenna type (unidirectional or omnidirectional) for a given scenario is critical for a strong signal. • AP placement—A site survey must be done to determine the best placement for access points. Environmental factors such as concrete walls, reflective materials on windows, and metals studs can all affect signal quality. Keep in mind signal phenomena: reflection (bounce), diffraction, and scattering. • Mismatches—The wireless client must use the same ­encryption protocol and passphrase as the AP and the correct SSID (SSIDs are case sensitive). Troubleshooting Methodology CompTIA defines a seven-step approach to network troubleshooting as follows: 1. Identify the problem 2. Establish a theory of probable cause 3. Test the theory to determine cause 4. Establish a plan of action 5. Implement the solution or escalate as necessary 6. Verify system functionality 7. Document findings, actions, and outcomes Using Troubleshooting Tools Some of the tools needed to troubleshoot a network are built right into the operating system in the form of command-line tools as described in the following table: Command Description ipconfig ping tracert nslookup arp pathping netstat nmap View IP address configuration Verify host connectivity View path to a device Perform DNS lookups View arp cache Verifies path and connectivity Displays TCP/IP connection information Scans a network for open ports and provides application and OS information about hosts Troubleshoot Network Issues Numerous things that can go wrong with a network, ranging from misconfigured devices to hardware failures. Network technicians must be able to recognize the signs and symptoms of some of the most common reasons for network failure so they can quickly identify and resolve them. The following list describes some common reasons for network errors or failures: • Incorrect IP configuration—Occurs when the IP address, subnet mask or default gateway of a device doesn’t match the network configuration. Most often occurs with static addresses. Use ipconfig to verify. • Blocked ports—Misconfigured firewalls can result in ports ­being blocked that applications require. Ports can also be blocked by incorrect ACL settings on routers. • Duplicate IP—Most often occurs when addresses are assigned statically or if the DHCP server is malfunctioning. Use ipconfig to verify or examine the DHCP server lease data. • Misconfigured DHCP—If the DHCP server has incorrect scope data or options, all devices on the network that use dynamic addresses will be affected. Check for exhausted DHCP scope. In addition, protect against rogue DHCP servers using DHCP snooping on switches. You may also need to use a variety of other tools and equipment to install, troubleshoot, and test a network: Tool Description Protocol analyzer Multimeter Cable tester Spectrum analyzer Tone generator Light meter TDR/OTDR Capture and view packets; also called a sniffer Test electrical properties Check patch cables and cable terminations Assesses the quality of a wireless signal Verifies cable location and continuity Measures light power for fiber optic cabling Measures copper/fiber cable length EMI/RFI—Electromagnetic or radio frequency interference generated by motors, fluorescent lights, power lines, and large machinery and electronic equipment. Attenuation—The weakening of the signal as it travels across the length of the media. Attenuation can be a problem if the media exceeds the maximum length. Troubleshoot Wired Connections Copper cables must be properly terminated by installing an RJ-45 plug or by punching down the ends into an RJ-45 jack or a 110 block patch panel. Improper termination or incorrect installation can cause a variety of problems including the following: • Open—A problem that occurs when a circuit does not exist such as when a wire breaks or is not making contact with a conductor. • Short—A problem that occurs when two wires that should not touch, come into contact with each other. • Crosstalk—Interference caused by the electromagnetic field of one wire traveling to an adjacent wire. Near end crosstalk (NEXT) occurs near the transmitter and far end crosstalk (FEXT) occurs near the receiver. © 2019 Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. 6 69378_isrt_ptg01_hires.indd 9 07/05/18 6:58 pm