SlideShare a Scribd company logo
1 of 57
Guide to Networking Essentials,
6th
Edition
Chapter 13: Troubleshooting and
Support
Copyright © 2012 Cengage Learning. All rights reserved. 2
Objectives
2
• Describe the benefits of documenting a network
and list what elements should be documented
• Explain different approaches to network
troubleshooting
• List the steps of the problem-solving process
• Explain how to make use of problem-solving
resources
• Describe network troubleshooting tools
• Summarize common trouble situations
• Describe disaster recovery procedures, including
backup plans and system recovery tools
Copyright © 2012 Cengage Learning. All rights reserved. 3
Documenting Your Network
• Why should you document your network?
– Makes equipment moves, additions, and changes easier
– Provides needed information for troubleshooting
– Offers justification for additional staff or equipment
– Helps determine compliance with standards
– Supplies proof that your installations meet manufacturer
hardware or software requirements
– Reduces training requirements
– Facilitates security management
– Allows for better compliance with software licensing
agreements
Copyright © 2012 Cengage Learning. All rights reserved. 4
Documenting Your Network
• Documentation and Network Changes
– When a workstation is moved, you must know which
patch-panel and switch ports are currently being used so they
can be disconnected
– Without proper documentation, cables must be traced
– Additions made to your network can happen more quickly and
with less chance for errors if documentation is up to date
• Documentation and Troubleshooting
– Accurate documentation of workstation MAC addresses helps
quickly find issues such as IP address conflicts and the source
of invalid or excessive frames
– Physical and logical addressing, connectivity to devices, and
even data about the cabling should be documented
Copyright © 2012 Cengage Learning. All rights reserved. 5
Documenting Your Network
• Documentation and IT Staffing
– Documenting the type and frequency of support calls can
provide justification for additions to staff or tools to make
support more efficient
– Statistics on network response time and bandwidth load as
justification for upgrading servers or adding new equipment
– Train new employees on how to properly document additions
and changes
• Documentation Standards
– Be sure to document which standards are in use
• Example: Whether 568-A or 568-B wiring standard is used for
patch panels and jacks
Copyright © 2012 Cengage Learning. All rights reserved. 6
Documenting Your Network
• Documentation and Technical Support
– When solving a network device problem, some manufacturers
of network devices will want to know that your cabling passed
appropriate tests, as well as other test results
– When calling technical support for a software problem on one
of your servers, the manufacturer will most likely want to know
the hardware details as well as operating system version and
patch installations
• Documentation and Security
– Documenting security patches and virus protection updates
helps you adhere to your security policies and confirms your
resistance to current threats
What Should Be Documented?
Copyright © 2012 Cengage Learning. All rights reserved. 7
• Some items you might want to document:
– Description of the network: Should include network topology,
network technologies in use, operating systems installed, and
number of devices and users served
– Cable plant: Describes the physical layout of your network
cabling, the terminations used, conventions used for labeling
your cable and equipment, and results of tests completed on
the cable plant
– Equipment rooms/telecommunications closets: Document the
items in each room and their location
– Internetworking devices: Know what devices are connected to
other devices, network management features, port usage,
physical and logical addresses, model numbers, and
hardware/software revision numbers
Copyright © 2012 Cengage Learning. All rights reserved. 8
What Should Be Documented?
• Servers – These include file and print servers, Web
servers, DNS and DHCP servers
– Document hardware configuration, operating system and
application version numbers, NIC information, and system
serial and model numbers
• Workstations – Hardware and software
configuration, physical and logical addresses
Copyright © 2012 Cengage Learning. All rights reserved. 9
Approaches to Network
Troubleshooting
• Different methods of troubleshooting:
– Trial and Error
– Solve by Example
– The Replacement Method
– Step by Step with the OSI Model
Copyright © 2012 Cengage Learning. All rights reserved. 10
Trial and Error
• Trial-and-error requires an assessment of the
problem, an educated guess to a solution and a
test of the results
• Used under the following conditions:
− The system is being newly configured, no data can be lost
− The system is not attached to a live network
− You can undo changes easily
− Other approaches would take more time than a few trial-and-
error attempts
− There are few possible causes of the problem
− No documentation and other resources are available to draw
on to arrive at a solution more scientifically
Trial and Error
• Is NOT advisable under these conditions:
– A server or internetworking device is live on the network
– The problem is being discussed over the phone and you’re
instructing an untrained user
– You aren’t sure of the consequences of the solutions you
propose
– You have no sure way to undo the changes after they’re made
– Other approaches will take the same amount of time
Copyright © 2012 Cengage Learning. All rights reserved. 11
Copyright © 2012 Cengage Learning. All rights reserved. 12
Trial and Error
• Follow these guidelines when using this method:
– Make only one change at a time before testing the results
– Avoid making changes that might affect the operation of a live
network
– Document the original settings of hardware and software
before making changes
– Avoid making a change that can destroy user data
– If possible, avoid making a change that you can’t undo
Copyright © 2012 Cengage Learning. All rights reserved. 13
Solve by Example
• Solving by example is the process of comparing
something that doesn’t work with something that does
• One of the easiest and fastest ways to solve a problem
• General rules to follow:
– Use the solve-by-example approach only when the working
sample has a similar environment as the problem machine
– Don’t make configuration changes that will cause conflicts, i.e,
don’t change the TCP/IP address of a nonworking machine to
the same address as a working machine
– Don’t make any changes that could destroy data that can’t be
restored
Copyright © 2012 Cengage Learning. All rights reserved. 14
The Replacement Method
• Requires narrowing down possible sources of the
problem and having known working replacement parts
on hand so that they can be swapped out
• Follow these rules when using this method:
– Narrow the list of potentially defective parts down to a few
possibilities
– Make sure you have the correct replacement parts on hand
– Replace only one part at a time
– If your first replacement does not fix the problem, reinstall the
original part before replacing another part
Copyright © 2012 Cengage Learning. All rights reserved. 15
Step by Step with the OSI Model
• You test a problem starting at the Application
layer and keep testing at each layer until you
have a successful test or reach the Physical
layer
– You could also start at the Physical layer and work your way
up
• To use this approach, you must understand how
networks work and where you should use
troubleshooting tools
Copyright © 2012 Cengage Learning. All rights reserved. 16
The Problem-Solving Process
• Steps of the problem-solving process:
– Determine the problem definition and scope
– Gather information
– Consider possible causes
– Devise a solution
– Implement the solution
– Test the solution
– Document the solution
– Devise preventive measures
Copyright © 2012 Cengage Learning. All rights reserved. 17
Step 1: Determine the Problem
Definition and Scope
• A problem definition should describe what does
work and what doesn’t work
• Know who and what are affected by the problem
• Questions to ask:
– Is anyone else near you having the same problem?
– What about other areas of the building?
– Is the problem occurring with all applications or just one?
– If you move to a different computer, does the problem
occur there as well?
Copyright © 2012 Cengage Learning. All rights reserved. 18
Step 1: Determine the Problem
Definition and Scope
• Examples of a problem definition and scope:
– Jim can’t access the e-mail server. Other servers are available
to Jim, and no one else reports the problem.
– Third-floor users can’t log on to the network; other floors can.
– Vanessa can’t print to the new LaserJet printer on her fourth
floor. She as tried several applications. No other users have
tried to print to this printer.
• Assign a priority to the problem once you have
defined it.
Copyright © 2012 Cengage Learning. All rights reserved. 19
Step 2: Gather Information
• Know the right questions to ask:
• Did it ever work?
– This question is often overlooked, but may prove helpful
• When did it stop working?
– Does the problem occur all the time or only intermittently?
– Are there particular times of the day when the problem occurs?
– Are other applications running when the problem occurs?
• Has anything changed?
– Ask yourself that question as well … were any network
changes made?
Copyright © 2012 Cengage Learning. All rights reserved. 20
Step 2: Gather Information
• Never ignore the obvious
– Check for unplugged cables
• Define how it is supposed to work
– Have good documentation and a clear baseline of your
network
– A baseline of your network should include network
utilization statistics; utilization statistics on server CPUs,
memory, hard drives, and other resources; and normal
traffic patterns
– Why important? Example: If network utilization
increases 2-3% per month for several months, you can
prepare for a performance upgrade
Step 3: Consider Possible Causes
• Your goal is to create a checklist of possible things
that could have gone wrong
• Example: An entire area of a building lost connection
with the network, but no other areas are affected
– The connection in the main wiring closet to the rest of the
network has failed
– The switch to which all workstations are connected has lost
power or completely failed in some way
– All workstations have acquired a virus through the network, and
the virus affects their network connection
– A major upgrade has been made recently on all workstations in
that area, and incorrect network addresses were configured
Copyright © 2012 Cengage Learning. All rights reserved. 21
Step 4: Devise a Solution
• Before devising a solution, consider the following:
– Is the identified cause of the problem truly the cause, or is it just
another symptom of the problem’s true cause?
– Is there a way to test the proposed solution adequately?
– What results should the proposed solution produce?
– What are the ramifications of the proposed solution for the rest of the
network?
– Do you need additional help to answer some of these questions?
• You might need to:
– Save all network device configuration files
– Document and back up workstation configurations
– Document wiring closet configurations
– Conduct a final baseline to compare new and old results
Copyright © 2012 Cengage Learning. All rights reserved. 22
Step 5: Implement the Solution
• You should design the implementation so that you
can stop and test it at critical points
– Testing small steps in which a limited number of things could
go wrong is easier than testing a complex solution with lots of
problem areas
• If your plan affects other parts of the network (other
users), you need to inform your users of the
possible disruption to some network services
• Take notes about every change you make to the
network or servers
Copyright © 2012 Cengage Learning. All rights reserved. 23
Step 6: Test the Solution
• Your testing should attempt to emulate a real-world
situation as closely as possible
• If testing a workstation problem:
– Attempt to logon to the network as a user with similar privileges
as the main user
– Next, attempt to access applications that would be run from
that workstation
• If testing a network upgrade:
– Start some workstations on the upgraded part of the network
and run some network-intensive applications
– Gather information about how the network behaves and
compare to previous results (before the upgrade)
Copyright © 2012 Cengage Learning. All rights reserved. 24
Step 7: Document the Solution
• Your documentation should include everything
pertinent to the problem
– Problem definition
– Solution
– Implementation
– Testing
• If the problem and its solution have implications for
the entire network, include this information
Copyright © 2012 Cengage Learning. All rights reserved. 25
Copyright © 2012 Cengage Learning. All rights reserved. 26
Step 8: Devise Preventive Measures
• Example:
– If your problem was a virus that spread throughout the network,
install virus protection programs on your network and tighten
policies for software and e-mail downloads
• Devising preventive measures is proactive rather
than reactive network management
Making Use of Problem-Solving
Resources
• Resources available to you during the
troubleshooting process:
– Experience
– The World Wide Web
– Network Documentation
Copyright © 2012 Cengage Learning. All rights reserved. 27
Experience
• Make the most of your experience
– Take notes about what you see and learn
• If it happened once, it will happen again
– Don’t think that a problem is so obscure that it will never
happen again. Take the time to make note of it.
• Colleagues’ experience
– Use the people you know as a resource
• Experience from manufacturer’s technical support
– Best time to call is when you have a specific error number or
message that you can report to the manufacturer
– Have software version numbers or hardware’s serial number
available when calling
Copyright © 2012 Cengage Learning. All rights reserved. 28
The World Wide Web
• Most manufacturers create databases of problems
and solutions so their customers can research the
problem themselves (called a knowledge base or
frequently asked questions/FAQ document)
• Using a Knowledge Base or Search Engine
– Be as specific as possible
– With error messages, enclose them in quotations marks
• Finding Drivers and Updates
– When installing a new device or OS, check whether bug fixes,
driver updates, or new firmware revisions are available
Copyright © 2012 Cengage Learning. All rights reserved. 29
The World Wide Web
• Consulting Online Support Services and
Newsgroups
– Many online services are dedicated to technical subjects
– A useful subscription pay service is Experts Exchange
(www.experts-exchange.com)
• Researching Online Periodicals
– Some of the most popular networking journals include:
• Network Computing
• Information Week
• Network World
• Windows IT Pro Magazine
• Linux Journal
Copyright © 2012 Cengage Learning. All rights reserved. 30
Network Documentation
• Your documentation should read like a user’s
manual for network administrators
• Network Diagrams
– Include network diagrams showing a logical picture of the
network and another diagram showing the network’s physical
aspects (rooms, devices, and connections)
• Internetworking Devices
– Require different levels of documentation
• Simple, unmanaged switches require the least information
– Should include model and serial numbers, location, IP address,
MAC address and number of ports (total and number of free
ports)
Copyright © 2012 Cengage Learning. All rights reserved. 31
Network Troubleshooting Tools
• Common tools for troubleshooting a network:
– Ping and Trace Route
– Network Monitors
– Protocol Analyzers
– Time-Domain Reflectometer (TDR)
– Cable Testers
– Advanced Monitoring Tools
Copyright © 2012 Cengage Learning. All rights reserved. 32
Ping and Trace Route
• The Ping command tells you whether your
computer can communicate with another computer
using IP
– With a successful reply, you know that the target machine is
running and there is a path between your computer and the
target
– Also tells you the amount of time elapsed before a reply was
received
• With a connectivity problem, first verify that there
are link lights on the switch and/or NIC
– Next, you can use ping to verify Network layer connectivity
Copyright © 2012 Cengage Learning. All rights reserved. 33
Ping and Trace Route
• Follow these steps:
– Run ipconfig/all – this displays IP configuration
– Ping loopback address – if you ping 127.0.0.1 and receive a
successful response, you have verified the IP protocol is
working properly
– Ping local IP address – verifies that the computer can receive
ICMP packets
– Ping default gateway – default gateway is the address of the
router the computer sends packets to when the destination is
on another network
– Ping IP address of host – verifies if you can communicate using
ICMP of the target computer
Copyright © 2012 Cengage Learning. All rights reserved. 34
Ping and Trace Route
• Follow these steps (continued):
– Ping DNS servers: A response from DNS servers indicates your
computer can communicate with a server that can resolve names to IP
addresses
– Use Nslookup: To verify that the DNS server can resolve the name of
the host you’re trying to communicate with
• Using Trace Route
– Tracert does a reverse DNS lookup on the IP address of each
router and displays the name of the router
– Response times can help you determine if there is a bottleneck
between the source and destination
– Can also be used to confirm your network design
Copyright © 2012 Cengage Learning. All rights reserved. 35
Ping and Trace Route
Copyright © 2012 Cengage Learning. All rights reserved. 36
Ping and Trace Route
Copyright © 2012 Cengage Learning. All rights reserved. 37
Network Monitors
• Network monitors are software packages that can
track all or part of the network traffic
– Can track packet type, errors, and traffic to and from each
computer
– Can generate reports and graphs
– Some programs can e-mail administrators when a problem is
detected
Copyright © 2012 Cengage Learning. All rights reserved. 38
Protocol Analyzers
• A protocol analyzer allows you to capture packets
and analyze the network traffic generated by
different protocols
– Can be used to troubleshoot problems related to DNS,
authentication, DHCP, IP addressing, remote access, and
many other processes
– Also used to create baselines for network performance
• Most advanced analyzers combine hardware and
software in a self-contained unit
• Examples: Microsoft Network Monitor, WildPackets
OmniPeek, Fluke Network OptiView Network
Analyzer, Wireshark
Copyright © 2012 Cengage Learning. All rights reserved. 39
Time-Domain Reflectometer (TDR)
• Used to determine whether there is a break or
short in a cable and measure the cable’s length
• The TDR sends an electrical pulse down the cable
that reflects back when it encounters a break or
short
– It measures the time it takes for the signal to return and can
estimate how far down the cable the fault is located
• You should use a TDR to document actual lengths
of all cables
Copyright © 2012 Cengage Learning. All rights reserved. 40
Basic Cable Testers
• Usually cost less than $100
• Only test the correct termination of a twisted-pair
cable or the continuity of a coaxial cable
• Great for checking patch cables and testing correct
termination at the patch panel and jack
• Cannot check for attenuation, noise or other
possible performance problems
Copyright © 2012 Cengage Learning. All rights reserved. 41
Advanced Cable Testers
• More expensive than TDRs or basic cable testers
• Performs several test for crosstalk, attenuation,
EMI, and impedance mismatches
• Some advanced cable testers can measure frame
counts, collisions, CRC errors, and broadcast
storms
• Can cost from $1000 to several thousand dollars
Copyright © 2012 Cengage Learning. All rights reserved. 42
Advanced Monitoring Tools
• Simple Network Management Protocol (SNMP) can
be installed in a Windows environment through the
Programs and Features applet in Control Panel
• SNMP software agents are loaded on network
devices you wish to manage and monitor
• Each agent monitors network traffic and device
status and stores information in a management
information base (MIB)
• You can set thresholds for generating alert
messages to network administrators
Copyright © 2012 Cengage Learning. All rights reserved. 43
Advanced Monitoring Tools
• Remote Monitoring (RMON) – an advanced
networking monitoring protocol
– Comes in two versions: RMON1 and RMON2
• RMON1 is designed to capture data and collect
statistics at the Data Link and Physical layers
• RMON2 can collect and analyze traffic at the
Network layer and higher layers
Copyright © 2012 Cengage Learning. All rights reserved. 44
Common Troubleshooting Situations
• Cabling and Related Components
– First step is to determine whether the problem is with the cable
or computer. Check by connecting another computer to the
cable.
– Verify it is the right type of cable for the connection and that it is
terminated correctly
– Check the back of the NIC card to see if it has indicator lights
– If NIC has no lights, you can try swapping out NICs
• Power Fluctuations
– Verify that the servers are up and running
– Use UPSs with battery power so they can be shut down without
data loss (in the event of power loss)
Copyright © 2012 Cengage Learning. All rights reserved. 45
Common Troubleshooting Situations
• Upgrades
– When you perform network upgrades:
• Keep current and do one upgrade at a time to make your
life easier
• Test any upgrade before deploying it on your production
network
• Tell users about upgrades; they will be more understanding
if they are notified beforehand
Copyright © 2012 Cengage Learning. All rights reserved. 46
Common Troubleshooting Situations
• Poor Network Performance
– Answer the following questions:
• What has changed since the last time the network functioned
normally?
• Has new equipment been added?
• Have new applications been added?
• Is someone playing electronic games across the network?
• Are there new users on the network? How many?
• Could any other new equipment, such as a generator, cause
interference near the network?
– If new users, added equipment, or newly introduced
applications seem to degrade network performance, it might be
time to expand your network
Copyright © 2012 Cengage Learning. All rights reserved. 47
Disaster Recovery
• Disaster can be anything from a server disk crash
to a fire or flood
• This section focuses on:
– Backup procedures
– Recovery from system failure
Copyright © 2012 Cengage Learning. All rights reserved. 48
Backing Up Network Data
• Determine what data should be backed up and how
often
• Develop a schedule for backing up your data
• Identify people responsible for performing backups
• Test your backup system regularly
• Maintain a backup log listing what data was backed
up, when the backup took place, who performed
the backup, and what media was used
• Develop a plan for storing data after it has been
backed up
Copyright © 2012 Cengage Learning. All rights reserved. 49
Backup Types
• Full backup – Copies all selected files to the
selected media and marks files as backed up
• Incremental backup – Copies all files changed
since the last full or incremental backup and marks
files as backed up
• Differential backup – Copies all files since the last
file backup; doesn’t mark files as backed up
• Copy backup – Copies selected files to the
selected media without marking files as backed up
• Daily backup – Copies all files changed the day the
backup is made; doesn’t mark files as backed up
Copyright © 2012 Cengage Learning. All rights reserved. 50
Backup Types
• A good model for creating a backup schedule
combines a weekly full backup with daily differential
backups
• When creating a schedule, post the schedule and
assign one person to perform the backups and sign
off on them
• Windows systems have an additional backup type
called a system state backup
– Copies the boot files, registry, Active Directory on domain
controllers, and other critical information
Copyright © 2012 Cengage Learning. All rights reserved. 51
System Repair and Recovery in
Windows
• Startup Repair – feature of Windows Recovery
Environment (WinRE)
Copyright © 2012 Cengage Learning. All rights reserved. 52
System Repair and Recovery in
Windows
• Last Known Good Configuration – repair utility that
can fix a Windows system that doesn’t boot
because of the installation of a new device driver
– Restores specific registry information that existed after the last
successful boot
• System Restore – Utility that restores a system to a
previous state
– Monitors all drives and partitions and records changes made to
system files, such as the Registry and some applications
– When major changes are made, the utility creates a restore
point so that the computer can be restored
Copyright © 2012 Cengage Learning. All rights reserved. 53
System Repair and Recovery in
Windows
• Driver Rollback – used when a new driver installed
for an existing device causes a problem with the
system
• Run this feature through Device Manager
• Driver Rollback is only useful when a previously
working device stops working after a driver update
Copyright © 2012 Cengage Learning. All rights reserved. 54
Copyright © 2012 Cengage Learning. All rights reserved. 55
Chapter Summary
• Documenting a network can have the following
advantages:
– Makes moves, adds and changes easier
– Provides needed information for troubleshooting
– Offers justification for additional staff or equipment
– Helps determine compliance with standards
– Supplies proof that your installations meet manufacturer
hardware or software requirements
– Reduces training requirements
– Facilitates security management
– Allows for better compliance with software licensing
agreements
Copyright © 2012 Cengage Learning. All rights reserved. 56
Chapter Summary
• Elements of the network that should be documented include
a network description, the cable plant, equipment rooms,
internetworking devices, servers and workstations.
• There are many approaches to network troubleshooting
including trial and error, solve by example, the replacement
method, and step by step using the OSI model.
• The problem-solving process involves eight steps: Determine
the problem definition and scope, gather information,
consider possible causes, devise a solution, implement the
solution, test the solution, document the solution, and devise
preventive measures.
• Resources available to help troubleshoot include experience,
the Web, and network documentation.
Chapter Summary
• There are several tools you can use to get information from
your network and its devices to help solve network problems.
• Some common troubleshooting situations are related to
cable plant components, electrical power, and network and
software upgrades.
• If your network is well documented, recovering from network
disaster will be easier. Some of the tools to prevent disasters
and expedite recovery include data backups, and system
repair and recovery features in Windows.
Copyright © 2012 Cengage Learning. All rights reserved. 57

More Related Content

What's hot

Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12APSU
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10APSU
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7APSU
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3APSU
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9APSU
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptOsama Yousaf
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemVaughan Olufemi ACIB, AICEN, ANIM
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communicationsKhan Yousafzai
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationJisc
 
A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)Tuan Yang
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer serverAbenezer Abiti
 
WAN Design Project
WAN Design ProjectWAN Design Project
WAN Design ProjectD Ther Htun
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationHerson Franz Ugale
 
Information system for you Chapter 15
Information system for you Chapter 15Information system for you Chapter 15
Information system for you Chapter 15Chakamru Pak
 
Testing and troubleshooting networks
Testing and troubleshooting networksTesting and troubleshooting networks
Testing and troubleshooting networksOnline
 

What's hot (20)

Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentation
 
A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer server
 
WAN Design Project
WAN Design ProjectWAN Design Project
WAN Design Project
 
Chapter10
Chapter10Chapter10
Chapter10
 
Ch07
Ch07Ch07
Ch07
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentation
 
9781111306366 ppt ch8
9781111306366 ppt ch89781111306366 ppt ch8
9781111306366 ppt ch8
 
Chapter11
Chapter11Chapter11
Chapter11
 
Information system for you Chapter 15
Information system for you Chapter 15Information system for you Chapter 15
Information system for you Chapter 15
 
Testing and troubleshooting networks
Testing and troubleshooting networksTesting and troubleshooting networks
Testing and troubleshooting networks
 
Unit 4 Assignment 01
Unit 4 Assignment 01Unit 4 Assignment 01
Unit 4 Assignment 01
 

Viewers also liked

Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)APSU
 
Chapter 8.administrative agency hearings
Chapter 8.administrative agency hearingsChapter 8.administrative agency hearings
Chapter 8.administrative agency hearingsAPSU
 
Chapter 6.investigations and information planning
Chapter 6.investigations and information planningChapter 6.investigations and information planning
Chapter 6.investigations and information planningAPSU
 
Chapter 7.informal proceedings
Chapter 7.informal proceedingsChapter 7.informal proceedings
Chapter 7.informal proceedingsAPSU
 
Chapter 4 pp
Chapter 4 ppChapter 4 pp
Chapter 4 ppAPSU
 
Chapter 3.agency discretion
Chapter 3.agency discretionChapter 3.agency discretion
Chapter 3.agency discretionAPSU
 
Module 2 patient transfers
Module 2 patient transfersModule 2 patient transfers
Module 2 patient transfersAPSU
 
Chapter 9.access to judicial review
Chapter 9.access to judicial reviewChapter 9.access to judicial review
Chapter 9.access to judicial reviewAPSU
 

Viewers also liked (8)

Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)
 
Chapter 8.administrative agency hearings
Chapter 8.administrative agency hearingsChapter 8.administrative agency hearings
Chapter 8.administrative agency hearings
 
Chapter 6.investigations and information planning
Chapter 6.investigations and information planningChapter 6.investigations and information planning
Chapter 6.investigations and information planning
 
Chapter 7.informal proceedings
Chapter 7.informal proceedingsChapter 7.informal proceedings
Chapter 7.informal proceedings
 
Chapter 4 pp
Chapter 4 ppChapter 4 pp
Chapter 4 pp
 
Chapter 3.agency discretion
Chapter 3.agency discretionChapter 3.agency discretion
Chapter 3.agency discretion
 
Module 2 patient transfers
Module 2 patient transfersModule 2 patient transfers
Module 2 patient transfers
 
Chapter 9.access to judicial review
Chapter 9.access to judicial reviewChapter 9.access to judicial review
Chapter 9.access to judicial review
 

Similar to Net essentials6e ch13

Quick and dirty performance analysis
Quick and dirty performance analysisQuick and dirty performance analysis
Quick and dirty performance analysisChris Kernaghan
 
Oracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & TuningOracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & TuningChris Muir
 
Principles of responsible suppliers
Principles of responsible suppliersPrinciples of responsible suppliers
Principles of responsible suppliersAlan Ward
 
ISBB_Chapter10.pptx
ISBB_Chapter10.pptxISBB_Chapter10.pptx
ISBB_Chapter10.pptxAronBalais1
 
Performance Assurance for Packaged Applications
Performance Assurance for Packaged ApplicationsPerformance Assurance for Packaged Applications
Performance Assurance for Packaged ApplicationsAlexander Podelko
 
System Development Life Cycle
System Development Life CycleSystem Development Life Cycle
System Development Life CycleAlifah Ilyana
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specificationAman Adhikari
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specificationAman Adhikari
 
Mastering BDD - Eran Kinsbruner Workshop Quest 2018
Mastering BDD - Eran Kinsbruner Workshop Quest 2018Mastering BDD - Eran Kinsbruner Workshop Quest 2018
Mastering BDD - Eran Kinsbruner Workshop Quest 2018Perfecto Mobile
 
Continuous Performance Monitoring of a Distributed Application [CON4730]
Continuous Performance Monitoring of a Distributed Application [CON4730]Continuous Performance Monitoring of a Distributed Application [CON4730]
Continuous Performance Monitoring of a Distributed Application [CON4730]Ashish Srivastava
 
System Implementation.pptx
System Implementation.pptxSystem Implementation.pptx
System Implementation.pptxMohamedNowfeek1
 
Supporting operations personnel a software engineers perspective
Supporting operations personnel a software engineers perspectiveSupporting operations personnel a software engineers perspective
Supporting operations personnel a software engineers perspectiveLen Bass
 
Performance tuning Grails applications SpringOne 2GX 2014
Performance tuning Grails applications SpringOne 2GX 2014Performance tuning Grails applications SpringOne 2GX 2014
Performance tuning Grails applications SpringOne 2GX 2014Lari Hotari
 
2015 02 24 lmtv baselining
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baseliningTony Fortunato
 
Software engineering
Software engineeringSoftware engineering
Software engineeringnimmik4u
 
Building block development in managed hosting - Angelo Rossi, Manager, Comple...
Building block development in managed hosting - Angelo Rossi, Manager, Comple...Building block development in managed hosting - Angelo Rossi, Manager, Comple...
Building block development in managed hosting - Angelo Rossi, Manager, Comple...Blackboard APAC
 

Similar to Net essentials6e ch13 (20)

Quick and dirty performance analysis
Quick and dirty performance analysisQuick and dirty performance analysis
Quick and dirty performance analysis
 
Oracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & TuningOracle ADF Architecture TV - Development - Performance & Tuning
Oracle ADF Architecture TV - Development - Performance & Tuning
 
Principles of responsible suppliers
Principles of responsible suppliersPrinciples of responsible suppliers
Principles of responsible suppliers
 
ISBB_Chapter10.pptx
ISBB_Chapter10.pptxISBB_Chapter10.pptx
ISBB_Chapter10.pptx
 
Performance Assurance for Packaged Applications
Performance Assurance for Packaged ApplicationsPerformance Assurance for Packaged Applications
Performance Assurance for Packaged Applications
 
3. 1 req elicitation
3. 1 req elicitation3. 1 req elicitation
3. 1 req elicitation
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
System Development Life Cycle
System Development Life CycleSystem Development Life Cycle
System Development Life Cycle
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specification
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specification
 
Mastering BDD - Eran Kinsbruner Workshop Quest 2018
Mastering BDD - Eran Kinsbruner Workshop Quest 2018Mastering BDD - Eran Kinsbruner Workshop Quest 2018
Mastering BDD - Eran Kinsbruner Workshop Quest 2018
 
Continuous Performance Monitoring of a Distributed Application [CON4730]
Continuous Performance Monitoring of a Distributed Application [CON4730]Continuous Performance Monitoring of a Distributed Application [CON4730]
Continuous Performance Monitoring of a Distributed Application [CON4730]
 
Test Policy and Practices
Test Policy and PracticesTest Policy and Practices
Test Policy and Practices
 
Design Principles
Design PrinciplesDesign Principles
Design Principles
 
System Implementation.pptx
System Implementation.pptxSystem Implementation.pptx
System Implementation.pptx
 
Supporting operations personnel a software engineers perspective
Supporting operations personnel a software engineers perspectiveSupporting operations personnel a software engineers perspective
Supporting operations personnel a software engineers perspective
 
Performance tuning Grails applications SpringOne 2GX 2014
Performance tuning Grails applications SpringOne 2GX 2014Performance tuning Grails applications SpringOne 2GX 2014
Performance tuning Grails applications SpringOne 2GX 2014
 
2015 02 24 lmtv baselining
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baselining
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Building block development in managed hosting - Angelo Rossi, Manager, Comple...
Building block development in managed hosting - Angelo Rossi, Manager, Comple...Building block development in managed hosting - Angelo Rossi, Manager, Comple...
Building block development in managed hosting - Angelo Rossi, Manager, Comple...
 

More from APSU

Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9APSU
 
Chapter2.development of administrative law
Chapter2.development of administrative lawChapter2.development of administrative law
Chapter2.development of administrative lawAPSU
 
Chapter1.admin law&adminagency
Chapter1.admin law&adminagencyChapter1.admin law&adminagency
Chapter1.admin law&adminagencyAPSU
 
Chapter1
Chapter1Chapter1
Chapter1APSU
 
Logi pp 1
Logi pp 1Logi pp 1
Logi pp 1APSU
 
Unit 1
Unit 1Unit 1
Unit 1APSU
 
Time management
Time managementTime management
Time managementAPSU
 
Research
ResearchResearch
ResearchAPSU
 
21st century learner
21st century learner21st century learner
21st century learnerAPSU
 
21st century learner
21st century learner21st century learner
21st century learnerAPSU
 

More from APSU (10)

Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Chapter2.development of administrative law
Chapter2.development of administrative lawChapter2.development of administrative law
Chapter2.development of administrative law
 
Chapter1.admin law&adminagency
Chapter1.admin law&adminagencyChapter1.admin law&adminagency
Chapter1.admin law&adminagency
 
Chapter1
Chapter1Chapter1
Chapter1
 
Logi pp 1
Logi pp 1Logi pp 1
Logi pp 1
 
Unit 1
Unit 1Unit 1
Unit 1
 
Time management
Time managementTime management
Time management
 
Research
ResearchResearch
Research
 
21st century learner
21st century learner21st century learner
21st century learner
 
21st century learner
21st century learner21st century learner
21st century learner
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Net essentials6e ch13

  • 1. Guide to Networking Essentials, 6th Edition Chapter 13: Troubleshooting and Support
  • 2. Copyright © 2012 Cengage Learning. All rights reserved. 2 Objectives 2 • Describe the benefits of documenting a network and list what elements should be documented • Explain different approaches to network troubleshooting • List the steps of the problem-solving process • Explain how to make use of problem-solving resources • Describe network troubleshooting tools • Summarize common trouble situations • Describe disaster recovery procedures, including backup plans and system recovery tools
  • 3. Copyright © 2012 Cengage Learning. All rights reserved. 3 Documenting Your Network • Why should you document your network? – Makes equipment moves, additions, and changes easier – Provides needed information for troubleshooting – Offers justification for additional staff or equipment – Helps determine compliance with standards – Supplies proof that your installations meet manufacturer hardware or software requirements – Reduces training requirements – Facilitates security management – Allows for better compliance with software licensing agreements
  • 4. Copyright © 2012 Cengage Learning. All rights reserved. 4 Documenting Your Network • Documentation and Network Changes – When a workstation is moved, you must know which patch-panel and switch ports are currently being used so they can be disconnected – Without proper documentation, cables must be traced – Additions made to your network can happen more quickly and with less chance for errors if documentation is up to date • Documentation and Troubleshooting – Accurate documentation of workstation MAC addresses helps quickly find issues such as IP address conflicts and the source of invalid or excessive frames – Physical and logical addressing, connectivity to devices, and even data about the cabling should be documented
  • 5. Copyright © 2012 Cengage Learning. All rights reserved. 5 Documenting Your Network • Documentation and IT Staffing – Documenting the type and frequency of support calls can provide justification for additions to staff or tools to make support more efficient – Statistics on network response time and bandwidth load as justification for upgrading servers or adding new equipment – Train new employees on how to properly document additions and changes • Documentation Standards – Be sure to document which standards are in use • Example: Whether 568-A or 568-B wiring standard is used for patch panels and jacks
  • 6. Copyright © 2012 Cengage Learning. All rights reserved. 6 Documenting Your Network • Documentation and Technical Support – When solving a network device problem, some manufacturers of network devices will want to know that your cabling passed appropriate tests, as well as other test results – When calling technical support for a software problem on one of your servers, the manufacturer will most likely want to know the hardware details as well as operating system version and patch installations • Documentation and Security – Documenting security patches and virus protection updates helps you adhere to your security policies and confirms your resistance to current threats
  • 7. What Should Be Documented? Copyright © 2012 Cengage Learning. All rights reserved. 7 • Some items you might want to document: – Description of the network: Should include network topology, network technologies in use, operating systems installed, and number of devices and users served – Cable plant: Describes the physical layout of your network cabling, the terminations used, conventions used for labeling your cable and equipment, and results of tests completed on the cable plant – Equipment rooms/telecommunications closets: Document the items in each room and their location – Internetworking devices: Know what devices are connected to other devices, network management features, port usage, physical and logical addresses, model numbers, and hardware/software revision numbers
  • 8. Copyright © 2012 Cengage Learning. All rights reserved. 8 What Should Be Documented? • Servers – These include file and print servers, Web servers, DNS and DHCP servers – Document hardware configuration, operating system and application version numbers, NIC information, and system serial and model numbers • Workstations – Hardware and software configuration, physical and logical addresses
  • 9. Copyright © 2012 Cengage Learning. All rights reserved. 9 Approaches to Network Troubleshooting • Different methods of troubleshooting: – Trial and Error – Solve by Example – The Replacement Method – Step by Step with the OSI Model
  • 10. Copyright © 2012 Cengage Learning. All rights reserved. 10 Trial and Error • Trial-and-error requires an assessment of the problem, an educated guess to a solution and a test of the results • Used under the following conditions: − The system is being newly configured, no data can be lost − The system is not attached to a live network − You can undo changes easily − Other approaches would take more time than a few trial-and- error attempts − There are few possible causes of the problem − No documentation and other resources are available to draw on to arrive at a solution more scientifically
  • 11. Trial and Error • Is NOT advisable under these conditions: – A server or internetworking device is live on the network – The problem is being discussed over the phone and you’re instructing an untrained user – You aren’t sure of the consequences of the solutions you propose – You have no sure way to undo the changes after they’re made – Other approaches will take the same amount of time Copyright © 2012 Cengage Learning. All rights reserved. 11
  • 12. Copyright © 2012 Cengage Learning. All rights reserved. 12 Trial and Error • Follow these guidelines when using this method: – Make only one change at a time before testing the results – Avoid making changes that might affect the operation of a live network – Document the original settings of hardware and software before making changes – Avoid making a change that can destroy user data – If possible, avoid making a change that you can’t undo
  • 13. Copyright © 2012 Cengage Learning. All rights reserved. 13 Solve by Example • Solving by example is the process of comparing something that doesn’t work with something that does • One of the easiest and fastest ways to solve a problem • General rules to follow: – Use the solve-by-example approach only when the working sample has a similar environment as the problem machine – Don’t make configuration changes that will cause conflicts, i.e, don’t change the TCP/IP address of a nonworking machine to the same address as a working machine – Don’t make any changes that could destroy data that can’t be restored
  • 14. Copyright © 2012 Cengage Learning. All rights reserved. 14 The Replacement Method • Requires narrowing down possible sources of the problem and having known working replacement parts on hand so that they can be swapped out • Follow these rules when using this method: – Narrow the list of potentially defective parts down to a few possibilities – Make sure you have the correct replacement parts on hand – Replace only one part at a time – If your first replacement does not fix the problem, reinstall the original part before replacing another part
  • 15. Copyright © 2012 Cengage Learning. All rights reserved. 15 Step by Step with the OSI Model • You test a problem starting at the Application layer and keep testing at each layer until you have a successful test or reach the Physical layer – You could also start at the Physical layer and work your way up • To use this approach, you must understand how networks work and where you should use troubleshooting tools
  • 16. Copyright © 2012 Cengage Learning. All rights reserved. 16 The Problem-Solving Process • Steps of the problem-solving process: – Determine the problem definition and scope – Gather information – Consider possible causes – Devise a solution – Implement the solution – Test the solution – Document the solution – Devise preventive measures
  • 17. Copyright © 2012 Cengage Learning. All rights reserved. 17 Step 1: Determine the Problem Definition and Scope • A problem definition should describe what does work and what doesn’t work • Know who and what are affected by the problem • Questions to ask: – Is anyone else near you having the same problem? – What about other areas of the building? – Is the problem occurring with all applications or just one? – If you move to a different computer, does the problem occur there as well?
  • 18. Copyright © 2012 Cengage Learning. All rights reserved. 18 Step 1: Determine the Problem Definition and Scope • Examples of a problem definition and scope: – Jim can’t access the e-mail server. Other servers are available to Jim, and no one else reports the problem. – Third-floor users can’t log on to the network; other floors can. – Vanessa can’t print to the new LaserJet printer on her fourth floor. She as tried several applications. No other users have tried to print to this printer. • Assign a priority to the problem once you have defined it.
  • 19. Copyright © 2012 Cengage Learning. All rights reserved. 19 Step 2: Gather Information • Know the right questions to ask: • Did it ever work? – This question is often overlooked, but may prove helpful • When did it stop working? – Does the problem occur all the time or only intermittently? – Are there particular times of the day when the problem occurs? – Are other applications running when the problem occurs? • Has anything changed? – Ask yourself that question as well … were any network changes made?
  • 20. Copyright © 2012 Cengage Learning. All rights reserved. 20 Step 2: Gather Information • Never ignore the obvious – Check for unplugged cables • Define how it is supposed to work – Have good documentation and a clear baseline of your network – A baseline of your network should include network utilization statistics; utilization statistics on server CPUs, memory, hard drives, and other resources; and normal traffic patterns – Why important? Example: If network utilization increases 2-3% per month for several months, you can prepare for a performance upgrade
  • 21. Step 3: Consider Possible Causes • Your goal is to create a checklist of possible things that could have gone wrong • Example: An entire area of a building lost connection with the network, but no other areas are affected – The connection in the main wiring closet to the rest of the network has failed – The switch to which all workstations are connected has lost power or completely failed in some way – All workstations have acquired a virus through the network, and the virus affects their network connection – A major upgrade has been made recently on all workstations in that area, and incorrect network addresses were configured Copyright © 2012 Cengage Learning. All rights reserved. 21
  • 22. Step 4: Devise a Solution • Before devising a solution, consider the following: – Is the identified cause of the problem truly the cause, or is it just another symptom of the problem’s true cause? – Is there a way to test the proposed solution adequately? – What results should the proposed solution produce? – What are the ramifications of the proposed solution for the rest of the network? – Do you need additional help to answer some of these questions? • You might need to: – Save all network device configuration files – Document and back up workstation configurations – Document wiring closet configurations – Conduct a final baseline to compare new and old results Copyright © 2012 Cengage Learning. All rights reserved. 22
  • 23. Step 5: Implement the Solution • You should design the implementation so that you can stop and test it at critical points – Testing small steps in which a limited number of things could go wrong is easier than testing a complex solution with lots of problem areas • If your plan affects other parts of the network (other users), you need to inform your users of the possible disruption to some network services • Take notes about every change you make to the network or servers Copyright © 2012 Cengage Learning. All rights reserved. 23
  • 24. Step 6: Test the Solution • Your testing should attempt to emulate a real-world situation as closely as possible • If testing a workstation problem: – Attempt to logon to the network as a user with similar privileges as the main user – Next, attempt to access applications that would be run from that workstation • If testing a network upgrade: – Start some workstations on the upgraded part of the network and run some network-intensive applications – Gather information about how the network behaves and compare to previous results (before the upgrade) Copyright © 2012 Cengage Learning. All rights reserved. 24
  • 25. Step 7: Document the Solution • Your documentation should include everything pertinent to the problem – Problem definition – Solution – Implementation – Testing • If the problem and its solution have implications for the entire network, include this information Copyright © 2012 Cengage Learning. All rights reserved. 25
  • 26. Copyright © 2012 Cengage Learning. All rights reserved. 26 Step 8: Devise Preventive Measures • Example: – If your problem was a virus that spread throughout the network, install virus protection programs on your network and tighten policies for software and e-mail downloads • Devising preventive measures is proactive rather than reactive network management
  • 27. Making Use of Problem-Solving Resources • Resources available to you during the troubleshooting process: – Experience – The World Wide Web – Network Documentation Copyright © 2012 Cengage Learning. All rights reserved. 27
  • 28. Experience • Make the most of your experience – Take notes about what you see and learn • If it happened once, it will happen again – Don’t think that a problem is so obscure that it will never happen again. Take the time to make note of it. • Colleagues’ experience – Use the people you know as a resource • Experience from manufacturer’s technical support – Best time to call is when you have a specific error number or message that you can report to the manufacturer – Have software version numbers or hardware’s serial number available when calling Copyright © 2012 Cengage Learning. All rights reserved. 28
  • 29. The World Wide Web • Most manufacturers create databases of problems and solutions so their customers can research the problem themselves (called a knowledge base or frequently asked questions/FAQ document) • Using a Knowledge Base or Search Engine – Be as specific as possible – With error messages, enclose them in quotations marks • Finding Drivers and Updates – When installing a new device or OS, check whether bug fixes, driver updates, or new firmware revisions are available Copyright © 2012 Cengage Learning. All rights reserved. 29
  • 30. The World Wide Web • Consulting Online Support Services and Newsgroups – Many online services are dedicated to technical subjects – A useful subscription pay service is Experts Exchange (www.experts-exchange.com) • Researching Online Periodicals – Some of the most popular networking journals include: • Network Computing • Information Week • Network World • Windows IT Pro Magazine • Linux Journal Copyright © 2012 Cengage Learning. All rights reserved. 30
  • 31. Network Documentation • Your documentation should read like a user’s manual for network administrators • Network Diagrams – Include network diagrams showing a logical picture of the network and another diagram showing the network’s physical aspects (rooms, devices, and connections) • Internetworking Devices – Require different levels of documentation • Simple, unmanaged switches require the least information – Should include model and serial numbers, location, IP address, MAC address and number of ports (total and number of free ports) Copyright © 2012 Cengage Learning. All rights reserved. 31
  • 32. Network Troubleshooting Tools • Common tools for troubleshooting a network: – Ping and Trace Route – Network Monitors – Protocol Analyzers – Time-Domain Reflectometer (TDR) – Cable Testers – Advanced Monitoring Tools Copyright © 2012 Cengage Learning. All rights reserved. 32
  • 33. Ping and Trace Route • The Ping command tells you whether your computer can communicate with another computer using IP – With a successful reply, you know that the target machine is running and there is a path between your computer and the target – Also tells you the amount of time elapsed before a reply was received • With a connectivity problem, first verify that there are link lights on the switch and/or NIC – Next, you can use ping to verify Network layer connectivity Copyright © 2012 Cengage Learning. All rights reserved. 33
  • 34. Ping and Trace Route • Follow these steps: – Run ipconfig/all – this displays IP configuration – Ping loopback address – if you ping 127.0.0.1 and receive a successful response, you have verified the IP protocol is working properly – Ping local IP address – verifies that the computer can receive ICMP packets – Ping default gateway – default gateway is the address of the router the computer sends packets to when the destination is on another network – Ping IP address of host – verifies if you can communicate using ICMP of the target computer Copyright © 2012 Cengage Learning. All rights reserved. 34
  • 35. Ping and Trace Route • Follow these steps (continued): – Ping DNS servers: A response from DNS servers indicates your computer can communicate with a server that can resolve names to IP addresses – Use Nslookup: To verify that the DNS server can resolve the name of the host you’re trying to communicate with • Using Trace Route – Tracert does a reverse DNS lookup on the IP address of each router and displays the name of the router – Response times can help you determine if there is a bottleneck between the source and destination – Can also be used to confirm your network design Copyright © 2012 Cengage Learning. All rights reserved. 35
  • 36. Ping and Trace Route Copyright © 2012 Cengage Learning. All rights reserved. 36
  • 37. Ping and Trace Route Copyright © 2012 Cengage Learning. All rights reserved. 37
  • 38. Network Monitors • Network monitors are software packages that can track all or part of the network traffic – Can track packet type, errors, and traffic to and from each computer – Can generate reports and graphs – Some programs can e-mail administrators when a problem is detected Copyright © 2012 Cengage Learning. All rights reserved. 38
  • 39. Protocol Analyzers • A protocol analyzer allows you to capture packets and analyze the network traffic generated by different protocols – Can be used to troubleshoot problems related to DNS, authentication, DHCP, IP addressing, remote access, and many other processes – Also used to create baselines for network performance • Most advanced analyzers combine hardware and software in a self-contained unit • Examples: Microsoft Network Monitor, WildPackets OmniPeek, Fluke Network OptiView Network Analyzer, Wireshark Copyright © 2012 Cengage Learning. All rights reserved. 39
  • 40. Time-Domain Reflectometer (TDR) • Used to determine whether there is a break or short in a cable and measure the cable’s length • The TDR sends an electrical pulse down the cable that reflects back when it encounters a break or short – It measures the time it takes for the signal to return and can estimate how far down the cable the fault is located • You should use a TDR to document actual lengths of all cables Copyright © 2012 Cengage Learning. All rights reserved. 40
  • 41. Basic Cable Testers • Usually cost less than $100 • Only test the correct termination of a twisted-pair cable or the continuity of a coaxial cable • Great for checking patch cables and testing correct termination at the patch panel and jack • Cannot check for attenuation, noise or other possible performance problems Copyright © 2012 Cengage Learning. All rights reserved. 41
  • 42. Advanced Cable Testers • More expensive than TDRs or basic cable testers • Performs several test for crosstalk, attenuation, EMI, and impedance mismatches • Some advanced cable testers can measure frame counts, collisions, CRC errors, and broadcast storms • Can cost from $1000 to several thousand dollars Copyright © 2012 Cengage Learning. All rights reserved. 42
  • 43. Advanced Monitoring Tools • Simple Network Management Protocol (SNMP) can be installed in a Windows environment through the Programs and Features applet in Control Panel • SNMP software agents are loaded on network devices you wish to manage and monitor • Each agent monitors network traffic and device status and stores information in a management information base (MIB) • You can set thresholds for generating alert messages to network administrators Copyright © 2012 Cengage Learning. All rights reserved. 43
  • 44. Advanced Monitoring Tools • Remote Monitoring (RMON) – an advanced networking monitoring protocol – Comes in two versions: RMON1 and RMON2 • RMON1 is designed to capture data and collect statistics at the Data Link and Physical layers • RMON2 can collect and analyze traffic at the Network layer and higher layers Copyright © 2012 Cengage Learning. All rights reserved. 44
  • 45. Common Troubleshooting Situations • Cabling and Related Components – First step is to determine whether the problem is with the cable or computer. Check by connecting another computer to the cable. – Verify it is the right type of cable for the connection and that it is terminated correctly – Check the back of the NIC card to see if it has indicator lights – If NIC has no lights, you can try swapping out NICs • Power Fluctuations – Verify that the servers are up and running – Use UPSs with battery power so they can be shut down without data loss (in the event of power loss) Copyright © 2012 Cengage Learning. All rights reserved. 45
  • 46. Common Troubleshooting Situations • Upgrades – When you perform network upgrades: • Keep current and do one upgrade at a time to make your life easier • Test any upgrade before deploying it on your production network • Tell users about upgrades; they will be more understanding if they are notified beforehand Copyright © 2012 Cengage Learning. All rights reserved. 46
  • 47. Common Troubleshooting Situations • Poor Network Performance – Answer the following questions: • What has changed since the last time the network functioned normally? • Has new equipment been added? • Have new applications been added? • Is someone playing electronic games across the network? • Are there new users on the network? How many? • Could any other new equipment, such as a generator, cause interference near the network? – If new users, added equipment, or newly introduced applications seem to degrade network performance, it might be time to expand your network Copyright © 2012 Cengage Learning. All rights reserved. 47
  • 48. Disaster Recovery • Disaster can be anything from a server disk crash to a fire or flood • This section focuses on: – Backup procedures – Recovery from system failure Copyright © 2012 Cengage Learning. All rights reserved. 48
  • 49. Backing Up Network Data • Determine what data should be backed up and how often • Develop a schedule for backing up your data • Identify people responsible for performing backups • Test your backup system regularly • Maintain a backup log listing what data was backed up, when the backup took place, who performed the backup, and what media was used • Develop a plan for storing data after it has been backed up Copyright © 2012 Cengage Learning. All rights reserved. 49
  • 50. Backup Types • Full backup – Copies all selected files to the selected media and marks files as backed up • Incremental backup – Copies all files changed since the last full or incremental backup and marks files as backed up • Differential backup – Copies all files since the last file backup; doesn’t mark files as backed up • Copy backup – Copies selected files to the selected media without marking files as backed up • Daily backup – Copies all files changed the day the backup is made; doesn’t mark files as backed up Copyright © 2012 Cengage Learning. All rights reserved. 50
  • 51. Backup Types • A good model for creating a backup schedule combines a weekly full backup with daily differential backups • When creating a schedule, post the schedule and assign one person to perform the backups and sign off on them • Windows systems have an additional backup type called a system state backup – Copies the boot files, registry, Active Directory on domain controllers, and other critical information Copyright © 2012 Cengage Learning. All rights reserved. 51
  • 52. System Repair and Recovery in Windows • Startup Repair – feature of Windows Recovery Environment (WinRE) Copyright © 2012 Cengage Learning. All rights reserved. 52
  • 53. System Repair and Recovery in Windows • Last Known Good Configuration – repair utility that can fix a Windows system that doesn’t boot because of the installation of a new device driver – Restores specific registry information that existed after the last successful boot • System Restore – Utility that restores a system to a previous state – Monitors all drives and partitions and records changes made to system files, such as the Registry and some applications – When major changes are made, the utility creates a restore point so that the computer can be restored Copyright © 2012 Cengage Learning. All rights reserved. 53
  • 54. System Repair and Recovery in Windows • Driver Rollback – used when a new driver installed for an existing device causes a problem with the system • Run this feature through Device Manager • Driver Rollback is only useful when a previously working device stops working after a driver update Copyright © 2012 Cengage Learning. All rights reserved. 54
  • 55. Copyright © 2012 Cengage Learning. All rights reserved. 55 Chapter Summary • Documenting a network can have the following advantages: – Makes moves, adds and changes easier – Provides needed information for troubleshooting – Offers justification for additional staff or equipment – Helps determine compliance with standards – Supplies proof that your installations meet manufacturer hardware or software requirements – Reduces training requirements – Facilitates security management – Allows for better compliance with software licensing agreements
  • 56. Copyright © 2012 Cengage Learning. All rights reserved. 56 Chapter Summary • Elements of the network that should be documented include a network description, the cable plant, equipment rooms, internetworking devices, servers and workstations. • There are many approaches to network troubleshooting including trial and error, solve by example, the replacement method, and step by step using the OSI model. • The problem-solving process involves eight steps: Determine the problem definition and scope, gather information, consider possible causes, devise a solution, implement the solution, test the solution, document the solution, and devise preventive measures. • Resources available to help troubleshoot include experience, the Web, and network documentation.
  • 57. Chapter Summary • There are several tools you can use to get information from your network and its devices to help solve network problems. • Some common troubleshooting situations are related to cable plant components, electrical power, and network and software upgrades. • If your network is well documented, recovering from network disaster will be easier. Some of the tools to prevent disasters and expedite recovery include data backups, and system repair and recovery features in Windows. Copyright © 2012 Cengage Learning. All rights reserved. 57