Solved

Trace Walk Port to port in closet

Posted on 2014-01-01
5
297 Views
Last Modified: 2014-01-03
We recently aquired a new building, the building has already been wired, none of the plates are labeled.  I am trying to figure the best way to trace the wall plates back to closet so i can label them.  This is mixture of Live networks & inactive networks.  Whats tools / methods should be used?
0
Comment
Question by:ManieyaK_
5 Comments
 
LVL 11

Accepted Solution

by:
Gregory Miller earned 250 total points
ID: 39749834
http://www.newark.com/tenma/72-8500/cable-locator-inductive-tone-probe/dp/80R7549?mckv=s4NspxnEk|pcrid|33870076941|plid|&CMP=KNC-GPLA

You need a toner like the one above. I have three different brands and they all work about the same. You will require the computer to be unplugged from the wall jack to do this but the switch should not care much and the remainder of your network should continue to function fine while searching.
0
 
LVL 32

Assisted Solution

by:_
_ earned 250 total points
ID: 39749924
They cost more, but if you need some "bells and whistles", the Fox and Hound is really good for this kind of stuff.

http://www.parts-express.com/triplett-3399-fox-2-hound-3-kit--390-231
0
 
LVL 1

Expert Comment

by:deshaunstyles
ID: 39750085
I would get a LAN mapper tool.  You can find and label multiple lines at a time.  I use this one, it's cheap and works great.

http://www.katerno.com/detail.php?s=213272
0
 

Author Comment

by:ManieyaK_
ID: 39753811
I found this tool from Sperry it seems to work very well for what we need it for.
Thanks for the input

http://www.amazon.com/gp/product/B00279JLBQ/ref=oh_details_o03_s00_i00?ie=UTF8&psc=1
0
 
LVL 32

Expert Comment

by:_
ID: 39754052
Looks good.   ; )

Thank you much.   : )
0

Featured Post

Watch Anatomy of a Wi-Fi Hack On-Demand

In less than a weekend, anyone with Internet access and some free time can become a Wi-Fi MitM to wreak havoc on your network. View our Wi-Fi Expert in an on-demand episode of our Secure Wi-Fi mini-series as he explores the motives, execution, and anatomy of a Wi-Fi hack.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
adjusting startup config 6 48
asset tags - importance 3 52
SMPS issue 1 38
Cisco 2911 Router - slow download speeds but very fast upload speeds 5 33
Is your computer hacked? learn how to detect and delete malware in your PC
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question