SlideShare a Scribd company logo
1 of 15
Troubleshooting
common network
issues.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Problems to escalate.
– Problems to resolve.
Page 4
Troubleshooting common network issues.
Page 5
The complexity of modern
networking has made using
a solid troubleshooting
methodology a necessity.
Networks can express problems and issues in many ways.
This can lead to much frustration on the part of network
users and the technicians responsible for fixing problems. If
such problems are not resolved quickly, they can lead to
loss of revenue and productivity for an organization.
There are a number of problems that should be escalated
up the troubleshooting chain in order for them to be resolved
in the most expedient manner.
Troubleshooting common network issues.
Page 6
Troubleshooting common network issues.
– Switching loop.
» Users complain that the network works fine for a while, then
goes down, and then works fine for a while.
• This indicates an STP (Spanning Tree Protocol) convergence
issue.
– Broadcast storm.
» A failing NIC or application may cause a situation in which a
broadcast storm is created.
• The NIC goes down and then comes back up repeatedly—
referred to as a flapping NIC. Each time it comes up, it sends
out a broadcast advertising its status, which creates traffic
congestion.
– Routing loop.
» Similar in nature to the switching loop, but involves the routing
process. This is more likely to occur with older routing protocols
(e.g., RIP v.2) but may also occur due to a misconfiguration of
routers (e.g., multiple static routes to the same location).
• Often, switching to a newer routing protocol (e.g., OSPF) will
resolve or banish routing loops.
Page 7
Troubleshooting common network issues.
– Other routing problems.
» Routing problems can manifest themselves in many different
ways including:
• Missing IP routes.
• Failure to discover neighboring devices.
• Failure to connect to neighboring devices.
» When routing problems are suspected, it is necessary to
escalate the issue to the proper technical team.
– Mismatched maximum transmission unit
(MTU) or the MTU black hole.
» Different types of WAN connections have different MTU
settings—the largest allowable size of a packet that can
traverse the link or be accepted by the link.
• Routers will negotiate the MTU between links using ICMP
(Internet Control Message Protocol).
» If ICMP has been disabled on the routers—a common
practice—when a router receives a packet that exceeds the
MTU, it will not respond and will drop the packet.
• The sending router continues to send the oversized packets
into the MTU black hole.
Page 8
Troubleshooting common network issues.
– NIC teaming.
» The process of bonding multiple NICs on a single system for
the purposes of increasing bandwidth, or for failover purposes.
• A misconfiguration may actually cause a loss of performance
or, in a worse case scenario, the total loss of functionality.
– Power failure or power anomalies.
» Power failures are easy to diagnose, but may be difficult to
recover from. While battery backups and generators may
mitigate the issue, they will not resolve the problem.
• If the problem occurs within the building, contact the
appropriate group responsible for building maintenance.
• If the problem occurs outside the building, contact the
appropriate utility.
» Electronic devices are sensitive to power issues. Anomalies in
the quality of the electricity delivered to a device may cause
problems.
• Using battery backups combined with power conditioners will
help to mitigate power anomalies.
Page 9
Troubleshooting common network issues.
Page 10
Troubleshooting common network issues.
– Incorrect IP configuration.
» Default gateway: local network’s or computer’s access to the
outside. An incorrect gateway will keep traffic from reaching its
destination.
• Verify the correct gateway settings and correct.
» Duplicate IP address: when duplicate IP addresses have been
configured, the first device booted up will get the address and the
second one up will get an address supplied by APIPA (Automatic
Private IP Addressing).
• Can occur when DHCP address reservation has not been
configured correctly.
• Verify and correct the configuration.
» DHCP misconfiguration: the problem is expressed in a similar
manner as the duplicate IP address problem (e.g., an APIPA
address is supplied) and is caused by a misconfiguration of DHCP.
• Verify DHCP settings and correct.
» DNS misconfiguration: users complain that they cannot get to
resources or destinations on the network when using the hostname.
DNS resolves hostnames to IP addresses, so a misconfiguration
will prevent the function of the process.
• Verify the correct DNS settings and correct.
Page 11
Troubleshooting common network issues.
– Incorrect VLAN assignment.
» Users complain that they cannot get to necessary network
resources.
• Tends to be a single host issue or involve a small group of
hosts.
• Verify VLAN settings and correct as necessary.
– Incorrect interface configuration.
» Users complain of poor network performance, or not being able
to connect to resources at all.
• Tends to affect a whole network segment.
• Configuration issues could include: mismatched port speeds
and/or duplex settings on the interfaces.
• Verify the correct interface configurations and correct the
settings.
Page 12
Troubleshooting common network issues.
– Simultaneous wireless and wired connection.
» Many laptops come with wireless and wired network capabilities
built into them. It is possible (though not very probable) for a
laptop to attempt to use both at the same time. This may cause
the device to quit communicating on the network.
• Reminding users to turn off wireless capabilities before joining
the wired network will resolve the problem.
– End-to-end connectivity.
» The complexity of networks will just about guarantee that end-to-
end connectivity—the ability to reach remote hosts—will be lost
at some point.
• The ping and tracert/traceroute utilities can be used to find
where the break in communication occurs. This information can
be used to determine the next course of action.
– Hardware failure.
» Networking equipment and devices will fail. When this happens,
it is usually denoted by the sudden loss or intermittent loss—in
the case of failing equipment—of function or access.
• Determining what failed and replacing it is the solution.
Page 13
Troubleshooting common network issues.
Using a methodology will ease the troubleshooting process. As part of that
methodology, knowing when to escalate the issue up the troubleshooting
chain is important. Some problems that should be escalated include:
switching loops, broadcast storms, routing loops, other routing problems, an
MTU black hole, NIC teaming configuration issues, and power problems.
Topic
Problems to escalate.
Summary
While there are networking problems that should be escalated, there are
others that can be easily resolved. These include: incorrect IP configuration,
VLAN assignment, and interface configurations; simultaneous wireless and
wired network connections; end-to-end connectivity issues; and hardware
failures.
Problems to resolve.
Page 14
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

What's hot (20)

PACE-IT: Virtualization Technology - N10 006
PACE-IT: Virtualization Technology - N10 006PACE-IT: Virtualization Technology - N10 006
PACE-IT: Virtualization Technology - N10 006
 
PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006 PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006
 
PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)
 
PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006 PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006
 
PACE-IT: Firewall Basics
PACE-IT: Firewall BasicsPACE-IT: Firewall Basics
PACE-IT: Firewall Basics
 
PACE-IT: Configuring Switches (part 1)
PACE-IT: Configuring Switches (part 1)PACE-IT: Configuring Switches (part 1)
PACE-IT: Configuring Switches (part 1)
 
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
 
PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Wireless LAN Infrastructure (part 2)PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Wireless LAN Infrastructure (part 2)
 
PACE-IT: Network Topologies - N10 006
PACE-IT: Network Topologies - N10 006 PACE-IT: Network Topologies - N10 006
PACE-IT: Network Topologies - N10 006
 
PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006 PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006
 
PACE-IT: Special IP Networking Concepts - N10 006
PACE-IT: Special IP Networking Concepts - N10 006PACE-IT: Special IP Networking Concepts - N10 006
PACE-IT: Special IP Networking Concepts - N10 006
 
PACE-IT: Applying Patches and Upgrades
PACE-IT: Applying Patches and UpgradesPACE-IT: Applying Patches and Upgrades
PACE-IT: Applying Patches and Upgrades
 
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
 
Pace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless NetworksPace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless Networks
 
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006 PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006
 
Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)
 
Pace IT - Client Networking (Part 1)
Pace IT - Client Networking (Part 1)Pace IT - Client Networking (Part 1)
Pace IT - Client Networking (Part 1)
 
Pace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks WiredPace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks Wired
 
PACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network SegmentationPACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network Segmentation
 
Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)
 

Viewers also liked

Guerra federal
Guerra federalGuerra federal
Guerra federallorelolli
 
Other themes in City of God
Other themes in City of GodOther themes in City of God
Other themes in City of GodNaamah Hill
 
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech oneHeavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech onePulsar
 
Science learning: the analogue versus the digital, Sai Pathmanathan
Science learning: the analogue versus the digital, Sai PathmanathanScience learning: the analogue versus the digital, Sai Pathmanathan
Science learning: the analogue versus the digital, Sai PathmanathanBrussels, Belgium
 
Медиа-кит ежеквартального бюллетеня "Корпоративная безопасность: проблемы и р...
Медиа-кит ежеквартального бюллетеня "Корпоративная безопасность: проблемы и р...Медиа-кит ежеквартального бюллетеня "Корпоративная безопасность: проблемы и р...
Медиа-кит ежеквартального бюллетеня "Корпоративная безопасность: проблемы и р...MOO АКБ
 
Waymaker Principles of Marketing Course Walkthrough
Waymaker Principles of Marketing Course WalkthroughWaymaker Principles of Marketing Course Walkthrough
Waymaker Principles of Marketing Course WalkthroughLumen Learning
 
Top travelling attractions
Top travelling attractionsTop travelling attractions
Top travelling attractionsAlina Golub
 
Unleasing africa's potential as a pole of global growth economic report on ...
Unleasing africa's potential as a pole of global growth   economic report on ...Unleasing africa's potential as a pole of global growth   economic report on ...
Unleasing africa's potential as a pole of global growth economic report on ...Dr Lendy Spires
 
خمسون نصيحة لكل ولي امر
خمسون نصيحة لكل ولي امرخمسون نصيحة لكل ولي امر
خمسون نصيحة لكل ولي امرMoemen Arafa
 
Desarrollo mis competencias ada
Desarrollo mis competencias adaDesarrollo mis competencias ada
Desarrollo mis competencias adaRoger Martinez
 
POLSKA GRUPA RATOWNICTWA MEDYCZNEGO
POLSKA GRUPA RATOWNICTWA MEDYCZNEGOPOLSKA GRUPA RATOWNICTWA MEDYCZNEGO
POLSKA GRUPA RATOWNICTWA MEDYCZNEGOBiuro PGRM
 
Auschwitz como paradigma biopolítico
Auschwitz como paradigma biopolíticoAuschwitz como paradigma biopolítico
Auschwitz como paradigma biopolíticoGerardoTripolone
 
Protéjase del robo de sus equipos
Protéjase del robo de sus equiposProtéjase del robo de sus equipos
Protéjase del robo de sus equiposMUNICIPIO DE ITAGUI
 
Connectedworld website info
Connectedworld website infoConnectedworld website info
Connectedworld website infostephrigby
 

Viewers also liked (20)

Guerra federal
Guerra federalGuerra federal
Guerra federal
 
Other themes in City of God
Other themes in City of GodOther themes in City of God
Other themes in City of God
 
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech oneHeavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech one
 
Science learning: the analogue versus the digital, Sai Pathmanathan
Science learning: the analogue versus the digital, Sai PathmanathanScience learning: the analogue versus the digital, Sai Pathmanathan
Science learning: the analogue versus the digital, Sai Pathmanathan
 
Luisiiithoo
LuisiiithooLuisiiithoo
Luisiiithoo
 
Януари
ЯнуариЯнуари
Януари
 
Ільєнко Т.А., вчитель-логопед СНВК «Мрія». Мінімальні прояви дизартрій у діте...
Ільєнко Т.А., вчитель-логопед СНВК «Мрія». Мінімальні прояви дизартрій у діте...Ільєнко Т.А., вчитель-логопед СНВК «Мрія». Мінімальні прояви дизартрій у діте...
Ільєнко Т.А., вчитель-логопед СНВК «Мрія». Мінімальні прояви дизартрій у діте...
 
Медиа-кит ежеквартального бюллетеня "Корпоративная безопасность: проблемы и р...
Медиа-кит ежеквартального бюллетеня "Корпоративная безопасность: проблемы и р...Медиа-кит ежеквартального бюллетеня "Корпоративная безопасность: проблемы и р...
Медиа-кит ежеквартального бюллетеня "Корпоративная безопасность: проблемы и р...
 
Waymaker Principles of Marketing Course Walkthrough
Waymaker Principles of Marketing Course WalkthroughWaymaker Principles of Marketing Course Walkthrough
Waymaker Principles of Marketing Course Walkthrough
 
Top travelling attractions
Top travelling attractionsTop travelling attractions
Top travelling attractions
 
Unleasing africa's potential as a pole of global growth economic report on ...
Unleasing africa's potential as a pole of global growth   economic report on ...Unleasing africa's potential as a pole of global growth   economic report on ...
Unleasing africa's potential as a pole of global growth economic report on ...
 
خمسون نصيحة لكل ولي امر
خمسون نصيحة لكل ولي امرخمسون نصيحة لكل ولي امر
خمسون نصيحة لكل ولي امر
 
Desarrollo mis competencias ada
Desarrollo mis competencias adaDesarrollo mis competencias ada
Desarrollo mis competencias ada
 
POLSKA GRUPA RATOWNICTWA MEDYCZNEGO
POLSKA GRUPA RATOWNICTWA MEDYCZNEGOPOLSKA GRUPA RATOWNICTWA MEDYCZNEGO
POLSKA GRUPA RATOWNICTWA MEDYCZNEGO
 
Auschwitz como paradigma biopolítico
Auschwitz como paradigma biopolíticoAuschwitz como paradigma biopolítico
Auschwitz como paradigma biopolítico
 
Protéjase del robo de sus equipos
Protéjase del robo de sus equiposProtéjase del robo de sus equipos
Protéjase del robo de sus equipos
 
Saucepolis news
Saucepolis newsSaucepolis news
Saucepolis news
 
Bases2014
Bases2014Bases2014
Bases2014
 
Connectedworld website info
Connectedworld website infoConnectedworld website info
Connectedworld website info
 
Document
DocumentDocument
Document
 

Similar to Pace it troubleshooting-common_network_issues_bf

Network Troubleshooting.pptx
Network Troubleshooting.pptxNetwork Troubleshooting.pptx
Network Troubleshooting.pptxMohamedSafeer14
 
Identifying and Resolving Network Problems 50 best.pptx
Identifying and Resolving Network Problems 50 best.pptxIdentifying and Resolving Network Problems 50 best.pptx
Identifying and Resolving Network Problems 50 best.pptxReshidJewar
 
Industrial Ethernet, Part 2: Case Studies
Industrial Ethernet,Part 2: Case StudiesIndustrial Ethernet,Part 2: Case Studies
Industrial Ethernet, Part 2: Case StudiesControlEng
 
Diagnosing Internet Outages
Diagnosing Internet OutagesDiagnosing Internet Outages
Diagnosing Internet OutagesThousandEyes
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
 

Similar to Pace it troubleshooting-common_network_issues_bf (20)

PACE-IT: Analyzing Monitoring Reports
PACE-IT: Analyzing Monitoring ReportsPACE-IT: Analyzing Monitoring Reports
PACE-IT: Analyzing Monitoring Reports
 
Network Troubleshooting.pptx
Network Troubleshooting.pptxNetwork Troubleshooting.pptx
Network Troubleshooting.pptx
 
PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006 PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006
 
Identifying and Resolving Network Problems 50 best.pptx
Identifying and Resolving Network Problems 50 best.pptxIdentifying and Resolving Network Problems 50 best.pptx
Identifying and Resolving Network Problems 50 best.pptx
 
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security ConsiderationsPACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security Considerations
 
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network VulnerabilitiesPACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network Vulnerabilities
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
 
Pace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO NetworkPace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO Network
 
Pace IT - Types of Networks
Pace IT - Types of NetworksPace IT - Types of Networks
Pace IT - Types of Networks
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 
Industrial Ethernet, Part 2: Case Studies
Industrial Ethernet,Part 2: Case StudiesIndustrial Ethernet,Part 2: Case Studies
Industrial Ethernet, Part 2: Case Studies
 
Pace IT - Network Cable Connectors
Pace IT - Network Cable ConnectorsPace IT - Network Cable Connectors
Pace IT - Network Cable Connectors
 
PACE-IT: Cable Management
PACE-IT: Cable ManagementPACE-IT: Cable Management
PACE-IT: Cable Management
 
network problem.pptx
network problem.pptxnetwork problem.pptx
network problem.pptx
 
Diagnosing Internet Outages
Diagnosing Internet OutagesDiagnosing Internet Outages
Diagnosing Internet Outages
 
PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)
 
Pace IT - Tools for Working on Networks
Pace IT - Tools for Working on NetworksPace IT - Tools for Working on Networks
Pace IT - Tools for Working on Networks
 
PACE-IT: Common Network Security Issues
PACE-IT: Common Network Security IssuesPACE-IT: Common Network Security Issues
PACE-IT: Common Network Security Issues
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Pace it troubleshooting-common_network_issues_bf

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Problems to escalate. – Problems to resolve.
  • 5. Page 5 The complexity of modern networking has made using a solid troubleshooting methodology a necessity. Networks can express problems and issues in many ways. This can lead to much frustration on the part of network users and the technicians responsible for fixing problems. If such problems are not resolved quickly, they can lead to loss of revenue and productivity for an organization. There are a number of problems that should be escalated up the troubleshooting chain in order for them to be resolved in the most expedient manner. Troubleshooting common network issues.
  • 6. Page 6 Troubleshooting common network issues. – Switching loop. » Users complain that the network works fine for a while, then goes down, and then works fine for a while. • This indicates an STP (Spanning Tree Protocol) convergence issue. – Broadcast storm. » A failing NIC or application may cause a situation in which a broadcast storm is created. • The NIC goes down and then comes back up repeatedly— referred to as a flapping NIC. Each time it comes up, it sends out a broadcast advertising its status, which creates traffic congestion. – Routing loop. » Similar in nature to the switching loop, but involves the routing process. This is more likely to occur with older routing protocols (e.g., RIP v.2) but may also occur due to a misconfiguration of routers (e.g., multiple static routes to the same location). • Often, switching to a newer routing protocol (e.g., OSPF) will resolve or banish routing loops.
  • 7. Page 7 Troubleshooting common network issues. – Other routing problems. » Routing problems can manifest themselves in many different ways including: • Missing IP routes. • Failure to discover neighboring devices. • Failure to connect to neighboring devices. » When routing problems are suspected, it is necessary to escalate the issue to the proper technical team. – Mismatched maximum transmission unit (MTU) or the MTU black hole. » Different types of WAN connections have different MTU settings—the largest allowable size of a packet that can traverse the link or be accepted by the link. • Routers will negotiate the MTU between links using ICMP (Internet Control Message Protocol). » If ICMP has been disabled on the routers—a common practice—when a router receives a packet that exceeds the MTU, it will not respond and will drop the packet. • The sending router continues to send the oversized packets into the MTU black hole.
  • 8. Page 8 Troubleshooting common network issues. – NIC teaming. » The process of bonding multiple NICs on a single system for the purposes of increasing bandwidth, or for failover purposes. • A misconfiguration may actually cause a loss of performance or, in a worse case scenario, the total loss of functionality. – Power failure or power anomalies. » Power failures are easy to diagnose, but may be difficult to recover from. While battery backups and generators may mitigate the issue, they will not resolve the problem. • If the problem occurs within the building, contact the appropriate group responsible for building maintenance. • If the problem occurs outside the building, contact the appropriate utility. » Electronic devices are sensitive to power issues. Anomalies in the quality of the electricity delivered to a device may cause problems. • Using battery backups combined with power conditioners will help to mitigate power anomalies.
  • 10. Page 10 Troubleshooting common network issues. – Incorrect IP configuration. » Default gateway: local network’s or computer’s access to the outside. An incorrect gateway will keep traffic from reaching its destination. • Verify the correct gateway settings and correct. » Duplicate IP address: when duplicate IP addresses have been configured, the first device booted up will get the address and the second one up will get an address supplied by APIPA (Automatic Private IP Addressing). • Can occur when DHCP address reservation has not been configured correctly. • Verify and correct the configuration. » DHCP misconfiguration: the problem is expressed in a similar manner as the duplicate IP address problem (e.g., an APIPA address is supplied) and is caused by a misconfiguration of DHCP. • Verify DHCP settings and correct. » DNS misconfiguration: users complain that they cannot get to resources or destinations on the network when using the hostname. DNS resolves hostnames to IP addresses, so a misconfiguration will prevent the function of the process. • Verify the correct DNS settings and correct.
  • 11. Page 11 Troubleshooting common network issues. – Incorrect VLAN assignment. » Users complain that they cannot get to necessary network resources. • Tends to be a single host issue or involve a small group of hosts. • Verify VLAN settings and correct as necessary. – Incorrect interface configuration. » Users complain of poor network performance, or not being able to connect to resources at all. • Tends to affect a whole network segment. • Configuration issues could include: mismatched port speeds and/or duplex settings on the interfaces. • Verify the correct interface configurations and correct the settings.
  • 12. Page 12 Troubleshooting common network issues. – Simultaneous wireless and wired connection. » Many laptops come with wireless and wired network capabilities built into them. It is possible (though not very probable) for a laptop to attempt to use both at the same time. This may cause the device to quit communicating on the network. • Reminding users to turn off wireless capabilities before joining the wired network will resolve the problem. – End-to-end connectivity. » The complexity of networks will just about guarantee that end-to- end connectivity—the ability to reach remote hosts—will be lost at some point. • The ping and tracert/traceroute utilities can be used to find where the break in communication occurs. This information can be used to determine the next course of action. – Hardware failure. » Networking equipment and devices will fail. When this happens, it is usually denoted by the sudden loss or intermittent loss—in the case of failing equipment—of function or access. • Determining what failed and replacing it is the solution.
  • 13. Page 13 Troubleshooting common network issues. Using a methodology will ease the troubleshooting process. As part of that methodology, knowing when to escalate the issue up the troubleshooting chain is important. Some problems that should be escalated include: switching loops, broadcast storms, routing loops, other routing problems, an MTU black hole, NIC teaming configuration issues, and power problems. Topic Problems to escalate. Summary While there are networking problems that should be escalated, there are others that can be easily resolved. These include: incorrect IP configuration, VLAN assignment, and interface configurations; simultaneous wireless and wired network connections; end-to-end connectivity issues; and hardware failures. Problems to resolve.
  • 15. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.