SlideShare a Scribd company logo
1 of 18
NETWORK
TROUBLESHOOTING
K.P.I. SHENESH PERERA
IDM
HARDWARE BASED ISSUES IN A
NETWORK
• Hardware troubleshooting is the process of reviewing,
diagnosing and identifying operational or technical problems
within a hardware device or equipment.
• It aims to resolve physical and/or logical problems and issues
within a computing hardware.
• This type of problem usually results in delays, timeouts or
simply just no response in a network.
• Often these issues are jumbled with software problems and are
take.
• Hardware problems take the longest time to troubleshoot and
usually require replacement or repairing that costs money.
GENERAL TIPS TO TROUBLESHOOT
HARDWARE ISSUES
• Removing, repairing and replacing faulty RAM, hard disk
or video/graphic card.
• Cleaning dusts from RAM and Video carts slot/ports and
from cooling fan.
• Tightening cable and jumpers on motherboard and/or
components.
• Software related hardware problems such as device driver
update or installation.
CABLE PROBLEMS
• Cables that connect different parts of a network can be cut
or severely damaged.
• A short circuiting can happen when the wire conductor
comes in contact with another conductive surface,
changing the path of the signal.
• Cable testers can be used to test for many types of cable
problems such as: Cut cable, incorrect cable connections,
Cable shorts, Interference level, Connector Problems
• This is usually the most common problem but is quite the
task to discover in a large network.
CONNECTIVITY PROBLEMS
• A connectivity problem with one or more devices in a
network can occur after a change is made in configuration
or by a malfunction of a connectivity component, such as
hub, a router or a Switch.
• As such there are devices like routers and switches are
often placed in rack mounts with patch panels set plugged
in with keystones so that during maintenance of the
devices the device itself doesn’t get harmed.
EXCESSIVE NETWORK COLLISIONS
• These often lead to slow connectivity.
• The problem can occur as a result of bad network
setup/plan, a user transferring a lot of information or
jabbering network card.
• A jabbering Network card is a network card that is stuck in
a transmit mode.
• This will be evident because the transmit light will remain
on constantly, indicating that the Network card is always
transmitting.
SOFTWARE BASED ISSUES IN
A NETWORK
• There are multiple ways to fix software issues and identify
them, simply because there are so many software issues
in a network.
• Usually if after troubleshooting all the hardware problems
that could possibly exist, then it is advised to move
towards using troubleshooting methods to identify
software problems.
PING TESTS
• The most commonly used network tool is the ping utility.
This utility is used to provide a basic connectivity test
between the requesting host and a destination host.
• This is done by using the Internet Control Message
Protocol (ICMP) which has the ability to send an echo
packet to a destination host and a mechanism to listen for
a response from this host.
• This utility is commonly used to provide a basic picture of
where a specific networking problem may exist.
Figure 1.0
TRACE ROUTE TESTING
• Typically, once the ping utility has been used to determine
basic connectivity.
• The tracert / traceroute utility can used to determine more
specific information about the path to the destination host
including the route the packet takes and the response time
of these intermediate hosts.
• The tracert utility and traceroute utilities perform the same
function but operate on different operating systems,
Tracert for Windows machines and traceroute for
GNU/Linux based machines.
Figure 1.1, kidscodecs.com, TIM SLAVIN, 15/05/2014
USING NSLOOKUP TO
TROUBLESHOOT DNS PROBLEMS
• Some of the most common networking issues revolve
around issues with Dynamic Name System (DNS) address
resolution issues.
• When this system does not work, most of the functionality
that people are used to goes away, as there is no way to
resolve this information.
• The nslookup utility can be used to lookup the specific IP
address associated with a domain name. If this utility is
unable to resolve this information, there is a DNS issue.
Figure 1.3, techrepublic.com, Cara Reynolds, 28/08/2006
NETWORK ERROR CODES
• Commonly, error codes occur when the network is often
connected to the internet.
• Each particular set of error codes have their own
implication as to what the problem is, this could give us
insight on what we should do to fix the problem. The
upcoming slides will explain some of the common error
codes.
• Below is a general description of errors in a network;
1. 1xx: Informational
2. 2xx: Success
3. 3xx: Redirection
4. 4xx: Client Error
5. 5xx: Server Error
500: INTERNAL SERVER ERROR
• Internal Server Error, means that server cannot process
the request for an unknown reason.
• Sometimes this code will appear when more specific 5xx
errors are more appropriate.
• This most common cause for this error is server
misconfiguration or missing packages
Figure 1.4, howtogeek.com, Chris Hoffman, 08/05/2017
502 BAD GATEWAY
• This means that the server is a gateway or proxy server, and it is
not receiving a valid response from the backend servers that
should actually fulfill the request.
• If the server in question is a reverse proxy server, such as a load
balancer, here are a few things to check:
1. The backend servers (where the HTTP requests are being
forwarded to) are healthy
2. The reverse proxy is configured properly, with the proper back
endes specified
3. The network onnection between the backend servers and reverse
proxy server is healthy. If the servers can communicate on other
ports, make sure that the firewall is allowing the traffic between
them
4. If your web application is configured to listen on a socket, ensure
that the socket exists in the correc location and that it has the
proper permissions
403 FORBIDDEN
• A Forbidden error, means that the user made a valid request
but the server is refusing to serve the request, due to a lack of
permission to access the requested resource.
• 403 errors commonly ocur when the user that is running the
web server process does not have sufficient permissions to
read the file that is being accessed.
NECESSITY OF A SYSTEM
DOCUMENTATION
1. You can’t secure your network without having any idea
how it’s connected.
2. In the event of an accident or some issue, you can just
refer the system documentation for guidelines.
3. The same network administrator won’t work forever in
your company.
4. Troubleshooting from scratch isn’t easy without having
any idea about the network.
5. Network devices do not last forever, they have to be
replaced.

More Related Content

Similar to Network Troubleshooting.pptx

Networking Hardware Requirements.pptx
Networking Hardware Requirements.pptxNetworking Hardware Requirements.pptx
Networking Hardware Requirements.pptxJhamaikaPaet
 
02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdfRobeliaJoyVillaruz
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network TroubleshootingJoy Sarker
 
AmericanEHR Webinar - Selecting the Right Hardware for your EHR-based Practice
AmericanEHR Webinar - Selecting the Right Hardware for your EHR-based PracticeAmericanEHR Webinar - Selecting the Right Hardware for your EHR-based Practice
AmericanEHR Webinar - Selecting the Right Hardware for your EHR-based PracticeCientis Technologies
 
Building data intensive applications
Building data intensive applicationsBuilding data intensive applications
Building data intensive applicationsAmit Kejriwal
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure orYogeshKumar187055
 
Identify-and-Resolve-Network-Problems.pptx
Identify-and-Resolve-Network-Problems.pptxIdentify-and-Resolve-Network-Problems.pptx
Identify-and-Resolve-Network-Problems.pptxTsegabrehanZerihun
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architectureMuhammad ismail Shah
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1TnNguyn57021
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationJisc
 
chapter 4 2014 (1).pptx
chapter 4 2014 (1).pptxchapter 4 2014 (1).pptx
chapter 4 2014 (1).pptxFerasGhdora
 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technologyInexk Pedrero
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Aakash Panchal
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationHerson Franz Ugale
 

Similar to Network Troubleshooting.pptx (20)

Networking Hardware Requirements.pptx
Networking Hardware Requirements.pptxNetworking Hardware Requirements.pptx
Networking Hardware Requirements.pptx
 
02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
AmericanEHR Webinar - Selecting the Right Hardware for your EHR-based Practice
AmericanEHR Webinar - Selecting the Right Hardware for your EHR-based PracticeAmericanEHR Webinar - Selecting the Right Hardware for your EHR-based Practice
AmericanEHR Webinar - Selecting the Right Hardware for your EHR-based Practice
 
Building data intensive applications
Building data intensive applicationsBuilding data intensive applications
Building data intensive applications
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure or
 
Chapter 12.0
Chapter 12.0Chapter 12.0
Chapter 12.0
 
Computer network
Computer networkComputer network
Computer network
 
Identify-and-Resolve-Network-Problems.pptx
Identify-and-Resolve-Network-Problems.pptxIdentify-and-Resolve-Network-Problems.pptx
Identify-and-Resolve-Network-Problems.pptx
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentation
 
chapter 4 2014 (1).pptx
chapter 4 2014 (1).pptxchapter 4 2014 (1).pptx
chapter 4 2014 (1).pptx
 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technology
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentation
 
Unit11
Unit11Unit11
Unit11
 
Network Testing ques
Network Testing quesNetwork Testing ques
Network Testing ques
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 

Network Troubleshooting.pptx

  • 2. HARDWARE BASED ISSUES IN A NETWORK • Hardware troubleshooting is the process of reviewing, diagnosing and identifying operational or technical problems within a hardware device or equipment. • It aims to resolve physical and/or logical problems and issues within a computing hardware. • This type of problem usually results in delays, timeouts or simply just no response in a network. • Often these issues are jumbled with software problems and are take. • Hardware problems take the longest time to troubleshoot and usually require replacement or repairing that costs money.
  • 3. GENERAL TIPS TO TROUBLESHOOT HARDWARE ISSUES • Removing, repairing and replacing faulty RAM, hard disk or video/graphic card. • Cleaning dusts from RAM and Video carts slot/ports and from cooling fan. • Tightening cable and jumpers on motherboard and/or components. • Software related hardware problems such as device driver update or installation.
  • 4. CABLE PROBLEMS • Cables that connect different parts of a network can be cut or severely damaged. • A short circuiting can happen when the wire conductor comes in contact with another conductive surface, changing the path of the signal. • Cable testers can be used to test for many types of cable problems such as: Cut cable, incorrect cable connections, Cable shorts, Interference level, Connector Problems • This is usually the most common problem but is quite the task to discover in a large network.
  • 5. CONNECTIVITY PROBLEMS • A connectivity problem with one or more devices in a network can occur after a change is made in configuration or by a malfunction of a connectivity component, such as hub, a router or a Switch. • As such there are devices like routers and switches are often placed in rack mounts with patch panels set plugged in with keystones so that during maintenance of the devices the device itself doesn’t get harmed.
  • 6. EXCESSIVE NETWORK COLLISIONS • These often lead to slow connectivity. • The problem can occur as a result of bad network setup/plan, a user transferring a lot of information or jabbering network card. • A jabbering Network card is a network card that is stuck in a transmit mode. • This will be evident because the transmit light will remain on constantly, indicating that the Network card is always transmitting.
  • 7. SOFTWARE BASED ISSUES IN A NETWORK • There are multiple ways to fix software issues and identify them, simply because there are so many software issues in a network. • Usually if after troubleshooting all the hardware problems that could possibly exist, then it is advised to move towards using troubleshooting methods to identify software problems.
  • 8. PING TESTS • The most commonly used network tool is the ping utility. This utility is used to provide a basic connectivity test between the requesting host and a destination host. • This is done by using the Internet Control Message Protocol (ICMP) which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host. • This utility is commonly used to provide a basic picture of where a specific networking problem may exist.
  • 10. TRACE ROUTE TESTING • Typically, once the ping utility has been used to determine basic connectivity. • The tracert / traceroute utility can used to determine more specific information about the path to the destination host including the route the packet takes and the response time of these intermediate hosts. • The tracert utility and traceroute utilities perform the same function but operate on different operating systems, Tracert for Windows machines and traceroute for GNU/Linux based machines.
  • 11. Figure 1.1, kidscodecs.com, TIM SLAVIN, 15/05/2014
  • 12. USING NSLOOKUP TO TROUBLESHOOT DNS PROBLEMS • Some of the most common networking issues revolve around issues with Dynamic Name System (DNS) address resolution issues. • When this system does not work, most of the functionality that people are used to goes away, as there is no way to resolve this information. • The nslookup utility can be used to lookup the specific IP address associated with a domain name. If this utility is unable to resolve this information, there is a DNS issue.
  • 13. Figure 1.3, techrepublic.com, Cara Reynolds, 28/08/2006
  • 14. NETWORK ERROR CODES • Commonly, error codes occur when the network is often connected to the internet. • Each particular set of error codes have their own implication as to what the problem is, this could give us insight on what we should do to fix the problem. The upcoming slides will explain some of the common error codes. • Below is a general description of errors in a network; 1. 1xx: Informational 2. 2xx: Success 3. 3xx: Redirection 4. 4xx: Client Error 5. 5xx: Server Error
  • 15. 500: INTERNAL SERVER ERROR • Internal Server Error, means that server cannot process the request for an unknown reason. • Sometimes this code will appear when more specific 5xx errors are more appropriate. • This most common cause for this error is server misconfiguration or missing packages Figure 1.4, howtogeek.com, Chris Hoffman, 08/05/2017
  • 16. 502 BAD GATEWAY • This means that the server is a gateway or proxy server, and it is not receiving a valid response from the backend servers that should actually fulfill the request. • If the server in question is a reverse proxy server, such as a load balancer, here are a few things to check: 1. The backend servers (where the HTTP requests are being forwarded to) are healthy 2. The reverse proxy is configured properly, with the proper back endes specified 3. The network onnection between the backend servers and reverse proxy server is healthy. If the servers can communicate on other ports, make sure that the firewall is allowing the traffic between them 4. If your web application is configured to listen on a socket, ensure that the socket exists in the correc location and that it has the proper permissions
  • 17. 403 FORBIDDEN • A Forbidden error, means that the user made a valid request but the server is refusing to serve the request, due to a lack of permission to access the requested resource. • 403 errors commonly ocur when the user that is running the web server process does not have sufficient permissions to read the file that is being accessed.
  • 18. NECESSITY OF A SYSTEM DOCUMENTATION 1. You can’t secure your network without having any idea how it’s connected. 2. In the event of an accident or some issue, you can just refer the system documentation for guidelines. 3. The same network administrator won’t work forever in your company. 4. Troubleshooting from scratch isn’t easy without having any idea about the network. 5. Network devices do not last forever, they have to be replaced.

Editor's Notes

  1. For example, if an Internet connection is down at an office, the ping utility can be used to figure out whether the problem exists within the office or within the network of the Internet provider.
  2. Along with simple lookup, the nslookup utility is able to query specific DNS servers to determine an issue with the default DNS servers configured on a host.
  3. Visit here: https://docs.microsoft.com/en-us/windows/desktop/netmgmt/network-management-error-codes for a full list of error codes in a windows network environment
  4. This error may appear in a variety of different ways, but they all mean the same thing. Depending on the website, you may see the message “500 Internal Server Error”, “500 Error”, “HTTP Error 500”, “500. That’s an error”, “Temporary Error (500)”, or just the error code “500”.