You are on page 1of 2

NUR NABILAH SHAFIQAH BINTI ROSLI

2019268474

LAB ACTIVITY (16 DECEMBER 2021)

1)

2) The best way to eliminate crosstalk is to exploit the very parallelism that leads to its creation by
closely coupling the return path to ground to your high-speed signals. Since the return path is equal
in magnitude but opposite in direction, the fields cancel out and reduce crosstalk.

Another way to ensure signal integrity is to use differential signaling, where two voltage lines equal
in magnitude but opposite in polarity are used to create a single high-speed data signal. Since the
actual data signal is taken as a difference between the voltages of the two voltage lines at the
receiver, and because electromagnetic noise tends to affect both lines equally, the signal itself
remains perceptible even in the presence of external noise.
3) Check the hardware. When you’re beginning the troubleshooting process, check all your hardware
to make sure it’s connected properly, turned on, and working. If a cord has come loose or somebody
has switched off an important router, this could be the problem behind your networking issues.

Use ipconfig. Open the command prompt and type “ipconfig” (without the quotes) into the terminal.
The Default Gateway (listed last) is your router’s IP. Your computer’s IP address is the number next
to “IP Address.” If your computer’s IP address starts with 169, the computer is not receiving a valid
IP address.

Use ping and tracert. If your router is working fine, and you have an IP address starting with
something other than 169, the problem’s most likely located between your router and the internet.
At this point, it’s time to use the ping tool. Try sending a ping to a well-known, large server, such as
Google, to see if it can connect with your router.

Network Troubleshooting Steps.

1. Identify the problem.

2. Establish a theory of probable cause.

3. Test the theory to determine cause.

4. Establish a plan of action to resolve the problem and identify potential effects

5. Implement the solution or escalates as necessary.

6. Verify full system functionality and if applicable implement preventative measures.

7. Document findings, actions, and outcomes.

You might also like