SlideShare a Scribd company logo
1 of 63
The Basics of Network
Troubleshooting
Chapter No.12
Preventing Problem
• Physical environment
• Electrical environment
• Viruses, Worm, Trojan Horses
Problem in Physical Environment
• Temperature
• Air Quality
• Magnetism
Electrical Problems
• Crosstalk
– UTP
– Solution STP
• Noise
– EMI
– RFI
– Solution
• Properly ground equipment
• Avoid placing cable close to possible EMI and RFI sources
• Use shielding in cables whenever possible
Electrical Problems
• Static
– ESD (Electrostatic discharge)
– Solution
• Always ground yourself and equipment
• Never let anyone touch you while you are working
• Never directly touch electrical leads of components
• Always use antistatic bags
• Transient
– Transient also commonly called spikes, is high voltage burst of
current.
– Solution
• Put the computer on its own circuit with a separate breaker.
• Ensure that a computer is properly grounded
Definition
• A virus is a self-
replicating program
that spreads by
inserting copies of
itself into other
executable code or
documents made by
crackers.
Types of Viruses
Macro Viruses
Executable Viruses
Backdoor Programs
Boot Sector Viruses
Macintosh Viruses
Hoaxes
Virus Information
Macro Viruses
• Most common type of virus on campus
• Affect Microsoft Office documents
• Written in Visual Basic for Applications
• Generally harmless with a few destructive varients
Executable Viruses
• Second most common type of virus on campus
• Written in programming languages and compiled
into executable files
• Generally more destructive
Backdoor Programs
• Sub-type of executable viruses
• Allow anyone on the internet to remotely control the
infected computer
– Send and receive files
– View the screen
– Start programs
– Monitor all keystrokes
Boot Sector Viruses
• Rare viruses
• Similar to executable except the reside in the boot
sector instead of as a file
• Generally very destructive
Macintosh Viruses
• Most virus code will not affect Macintosh
computers
– Macro viruses target “C:”
– Executables can not execute
– Backdoors can not execute
– Boot Sector Viruses can not infect HFS
• Macintosh computers can be carriers of Macro
Viruses
Hoaxes
• Warnings about viruses that do not exist
• Characteristics
– Claims the virus causes large amounts of damage
but lack specifics on how it works
– Claims unrealistic person (Bill Gates) or company
(AOL) started the warning
– Encourage you to pass it on to everyone you know
Methods Viruses Use to
Spread
Parasites
Worms
Trojan Horses
Booting
Parasites
• Imbed themselves into a program or data file
• Spread to other files when the infected file is
opened
• Only spread to other computers when the files are
shared
Worms
• Attempt to spread themselves to other computers
instead of only infecting files on the local computer
• Recent worms automatically send e-mail
attachments containing copies of the virus
Trojan Horses
• Disguise themselves as usefull programs
– Greetings cards
– Games
– Screen Savers
• Modify system files while the ‘usefull’ program
executes
Booting
• Boot sector viruses copy themselves to the boot
sector of a disk
• When the disk is used to boot a computer, the code
is loaded into memory
• The code resident in memory can be used to
deliver the payload and to infect other disks
How Anti-Virus Software Works
• Automatically loaded at start-up time
• Monitors all interaction with files
• Looks for hexadecimal patterns within files. These
patterns are defined by Virus Definition Files
• Virus Definition Files must be updated regularly to
ensure new viruses can be detected
Guide to Networking Essentials, Fourth Edition 21
Preventing Problems with
Network Management and Planning
• Two ways to solve networking problems
• Prevent them through planning and management
– Called pre-emptive troubleshooting or trouble
avoidance
• Repair and control damage that already exists
– Called troubleshooting
Guide to Networking Essentials, Fourth Edition 22
Preventing Problems with
Network Management and Planning (continued)
• Combine network management and
troubleshooting to form overall network plan
– Include cable diagrams, cable layers, network
capacity information, protocols and network
standards, documentation on computer and network
device configuration, software, and important files
• Establish network policies and procedures
– Include back-up methods, security, hardware and
software standards, upgrade guidelines, and
documentation
Guide to Networking Essentials, Fourth Edition 23
Backing Up Network Data
• To prevent data loss, develop comprehensive
back-up program, including:
– What data should be backed up and how often?
– What type of backup will be performed, how often,
and what time?
– Who is responsible for performing backups?
– Is backup system being tested regularly?
– Is backup log complete?
– Where is backed-up data stored (on-site and off-site)?
• Table 13-1 shows several back-up methods
Guide to Networking Essentials, Fourth Edition 24
Backup Methods
Guide to Networking Essentials, Fourth Edition 25
Setting Security Policies
• Security policies are part of network plan
– Include both data and hardware security
• Primary data security is username and passwords
for all accounts, including:
– How often users change passwords
– Whether users can reuse same passwords
– What character restrictions passwords have
– Whether passwords have single or multiple sets of
standards
– How exceptions are defined and documented
Guide to Networking Essentials, Fourth Edition 26
Setting Security Policies (continued)
• Establish guidelines for resource access
– Grant access only to users who require it
– Grant minimum levels of access
– Set special security requirements for dial-in accounts
– Keep to a minimum the number of users who
perform network administration tasks
Guide to Networking Essentials, Fourth Edition 27
Setting Hardware and Software
Standards
• Set standards for all network components
• Determine supported hardware manufacturers and
operating systems, including versions
• Determine what networking protocols and services
will be used
• Define server configurations and guidelines for new
server installations
• Evaluate standards at least once per quarter to
keep network up to date
Guide to Networking Essentials, Fourth Edition 28
Establishing Upgrade Guidelines
• Establish guidelines for upgrades
• Give users advance notice of changes
• Try not to perform upgrades during working hours
• First “pilot” upgrades with small group of astute
network users to resolve problems
• Have plan to undo upgrade installation if necessary
Guide to Networking Essentials, Fourth Edition 29
Maintaining Documentation
• Address list
• Cable map
• Contact list
• Equipment list
• Network history
• Network map
• Network hardware
configuration
• Policies and procedures
• Server configuration
• Software configuration
• Software licensing
• User administration
Keep complete up-to-date documentation of
network, both in hard copy and in electronic
form, including:
Guide to Networking Essentials, Fourth Edition 30
Performing Pre-emptive
Troubleshooting
• International Organization for Standardization (ISO)
identifies five categories for pre-emptive network
troubleshooting:
– Account management
– Configuration management
– Fault management
– Performance management
– Security management
Guide to Networking Essentials, Fourth Edition 31
Practicing Good
Customer-Relation Skills
• Users are customers, and the reason network
personnel have jobs
– Best source of information when something goes
wrong with network
– Develop special relationships with adept users
• Develop guidelines about user interaction
– Include how to question and respond to users, handle
irate users, and general user communication etiquette
Guide to Networking Essentials, Fourth Edition 32
Using Network-Monitoring Utilities
• Many programs help with network management
– Identify conditions that may lead to problems,
prevent network failures, and troubleshoot problems
• Use network management utilities
– Learn which statistics to monitor
– Establish baseline for network performance
– Monitor changes
Guide to Networking Essentials, Fourth Edition 33
Using Network-Monitoring Utilities
(continued)
• Use network management utilities in advanced
operating systems or from third-party sources
• Gather information about:
– Events
– System usage statistics
– System performance statistics
Guide to Networking Essentials, Fourth Edition 34
Using Network-Monitoring Utilities
(continued)
• Use information from utilities to help:
– Identify network devices that create bottlenecks
– Provide information to forecast growth and plan
capacity requirements
– Develop plans to improve network performance
– Monitor events that arise from software or hardware
changes
– Monitor trends in network traffic and utilization
• Figure 13-1 shows Windows XP Performance
Monitor
Guide to Networking Essentials, Fourth Edition 35
Windows XP Performance Monitor
Guide to Networking Essentials, Fourth Edition 36
Creating a Network Baseline
• Defines point of reference for measuring network
performance when problem occurs
• Create baseline over time when no problems are
evident on network and repeat baseline periodically,
especially after significant changes to network
• Compare network performance with baseline to help
identify:
– Daily network utilization patterns
– Possible network bottlenecks
– Heavy usage patterns
– Protocol traffic patterns
Guide to Networking Essentials, Fourth Edition 37
Monitoring with SNMP
• Simple Network Management Protocol (SNMP)
is part of TCP/IP protocol suite
• Software agents for each network device monitor
traffic and device status
– Store information in management information
base (MIB)
• See Figure 13-2
Guide to Networking Essentials, Fourth Edition 38
SNMP Network Monitoring
and Managing
Guide to Networking Essentials, Fourth Edition 39
Monitoring with SNMP (continued)
• SNMP monitors agents and collects data in MIBs to
generate statistics or charts about network
• Can set thresholds for SNMP managers
– Generate alerts when thresholds are exceeded
• Manage network components such as
bridges and routers
• Can interrogate devices and make remote
configuration changes
Guide to Networking Essentials, Fourth Edition 40
Using Remote Monitoring (RMON) for
Advanced Monitoring
• Two versions of RMON:
– RMON1 captures data and collects statistics at Data
Link and Physical layers
– RMON2 collects and analyzes traffic at Network and
higher layers
• Some devices are RMON-capable
– Contain software agents, called probes, that collect
data and communicate with management station
using SNMP
Guide to Networking Essentials, Fourth Edition 41
Network Troubleshooting
• In spite of planning, monitoring, and other pre-
emptive techniques, problems do occur
• Be ready to troubleshoot network to diagnose and
fix problems, by using:
– Troubleshooting methodology
– Structured approach
– Special tools
Guide to Networking Essentials, Fourth Edition 42
Troubleshooting Methodology
• Stay calm and use clear head to assess problems
• Steps to help troubleshoot common network
problems include:
– Eliminate potential user errors
– Verify physical connections are working
– Verify status of any suspect NICs
– Restart computer
Guide to Networking Essentials, Fourth Edition 43
Structured Approach
• Five-step structured troubleshooting approach for
tackling complex network problems:
– Set problem’s priority
– Collect information about problem
– Develop list of possible causes
– Test each hypothesis to isolate actual cause
– For each potential cause, attempt at least one
solution
Guide to Networking Essentials, Fourth Edition 44
Prioritize
• Determine scope of problem
– Does it affect single computer or more
• If multiple problems, assign each a priority
• Tackle them in decreasing order of severity, starting
with most severe problem
Guide to Networking Essentials, Fourth Edition 45
Collect Information
• Ask user specific questions to obtain details
• Scan network for obvious problems or failures
• Review previous network problems to determine if
problem is recurrent
• Determine scope of problem by dividing network
into small parts and checking each
• Create troubleshooting checklist to make
task more manageable
Guide to Networking Essentials, Fourth Edition 46
Establish Possible Causes
• Create list of possible causes
• Rank them in order of likelihood
• Start with most likely cause
Guide to Networking Essentials, Fourth Edition 47
Isolate the Problem
• Make only one change at a time and test it
• Be sure changes do not introduce new
problem
• Document all hardware, software, or configuration
changes
Guide to Networking Essentials, Fourth Edition 48
Test Results
• After each change, test results to see if problem is
fixed or new problem is introduced
• When problem is solved, document steps that
implemented solution
– Include information in network documentation
• If change does not fix problem, move to next
possible cause
• Sometimes a change reveals another deeper
problem
Guide to Networking Essentials, Fourth Edition 49
Using Special Tools
• Most problems occur at lower layers of OSI model
where they are more difficult to troubleshoot
• Variety of special troubleshooting tools help diagnose
problems, including:
– Digital voltmeter (DVM)
– Time-domain reflectometer (TDR)
– Basic and advanced cable testers
– Oscilloscopes
– Network monitors
– Protocol analyzers
Guide to Networking Essentials, Fourth Edition 50
Digital Voltmeter (DVM)
• Also called volt-ohm meter (VOM)
• Basic electrical measuring device
• Can measure cable’s resistance to determine
if it is broken
• Can detect short circuit in cable
Guide to Networking Essentials, Fourth Edition 51
Time-Domain Reflectometer (TDR)
• Determines if cable has break or short
• By reflecting back from break, can pinpoint how far
from device break occurs
– High quality TDR can come within few inches of break
• May be used with fiber-optic and electrical cables
• During new installation, use TDR to document actual
lengths of cables
• Standard part of most advanced cable testers
Guide to Networking Essentials, Fourth Edition 52
Basic Cable Testers
• Test correct termination of twisted-pair cable
• Test continuity of coaxial cable
• Excellent for checking patch cables
• Do not detect breaks in cables
• Do not check for attenuation, noise, or other
performance problems
Guide to Networking Essentials, Fourth Edition 53
Advanced Cable Testers
• Combine characteristics of DVM, TDR, and
protocol analyzer
• Detect where break is located in cable
• Gather information about cable’s impedance,
resistance, and attenuation
• Function at Physical and Data Link layers of OSI
model
• Can measure frame counts, collisions, congestion,
beaconing information, or broadcast storms
Guide to Networking Essentials, Fourth Edition 54
Oscilloscopes
• Measure signal voltage over time
• Identify shorts, sharp bends or crimps, cable
breaks, and attenuation problems
Guide to Networking Essentials, Fourth Edition 55
Network Monitors
• Software that tracks network traffic, including
packet types, errors, traffic to and from each
computer
• Can generate reports and graphs
• Included with Windows NT, 2000/2003 Server
versions and also available from third parties
Guide to Networking Essentials, Fourth Edition 56
Protocol Analyzers
• Most advanced network troubleshooting device
• Evaluates overall health of network
• Monitors all traffic in real time
• Captures traffic and decodes packets
• Looks inside packets to determine problems
• Generates network statistics
• Can establish baseline for network and troubleshoot
problems
• Most advanced ones combine hardware and software
• Especially good for Layer 3 (Network) devices
• Some protocol analysis capability in Window’s Network
Monitor
Guide to Networking Essentials, Fourth Edition 57
Network Support Resources
• Variety of network support resource formats
– Software products
– Online services
– Subscription services
– Printed material
Guide to Networking Essentials, Fourth Edition 58
Microsoft TechNet
• Microsoft Technical Information Network
(TechNet) is subscription service
– Includes monthly set of CD-ROMs with product
information, technical support updates, software
drivers, and online tutorials
• Valuable tool for gathering information and
diagnosing network problems
• Easy-to-use interface
• Online version is free
Guide to Networking Essentials, Fourth Edition 59
Common Troubleshooting Situations
• Some of most common network problems involve:
– Cabling and related components
– Power fluctuations
– Upgrades
– Poor network performance
Guide to Networking Essentials, Fourth Edition 60
Cabling and Related Components
• Majority of network problems occur at Physical
layer and involve cables, connectors, and NICs
– Make sure cable is properly connected and
correct kind
– Be sure length is within maximum limit for type of
medium
– Check LEDs on NIC, if available
– Exchange NIC with known working one
– Use PING utility to check connectivity to other
computers
Guide to Networking Essentials, Fourth Edition 61
Power Fluctuations
• Caused by electrical storm or power failure
• Adversely affect computers
• Afterwards, verify that servers are up and
functioning
• Use Uninterruptible Power Supplies (UPSs)
– Especially important for servers
– Provide battery power so computers can be brought
down without data loss
– Some perform automatic shutdowns
Guide to Networking Essentials, Fourth Edition 62
Upgrades
• Constantly changing technology makes it
necessary to upgrade equipment and software
frequently
• Some important considerations when performing
network upgrades:
– Keep current and do one upgrade at a time
– Ignoring upgrades may require complete network
overhaul
– Test any upgrade before deploying it
– Inform users about upgrade: when it will occur, what
is involved, and what to expect
Guide to Networking Essentials, Fourth Edition 63
Poor Network Performance
• If network slows over time, ask these questions
to pinpoint causes:
– What has changed?
– Have new equipment or applications been added?
– Is someone playing electronic games across
network?
– Are there new users on network? How many?
– Is other new equipment, such as a generator,
causing interference near network?
• May be necessary to expand network to increase
current capacity

More Related Content

What's hot

Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
jpprakash
 
Networking Chapter 6
Networking Chapter 6Networking Chapter 6
Networking Chapter 6
mlrbrown
 

What's hot (20)

17 roles of window server 2008 r2
17 roles of window server 2008 r217 roles of window server 2008 r2
17 roles of window server 2008 r2
 
Installing windows 10 and creating a bootable usb
Installing windows 10 and creating a bootable usbInstalling windows 10 and creating a bootable usb
Installing windows 10 and creating a bootable usb
 
Computer maintenance-and-repair
Computer maintenance-and-repairComputer maintenance-and-repair
Computer maintenance-and-repair
 
Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computer
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
Router configuration
Router configurationRouter configuration
Router configuration
 
Networking Chapter 6
Networking Chapter 6Networking Chapter 6
Networking Chapter 6
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
Testing and troubleshooting networks
Testing and troubleshooting networksTesting and troubleshooting networks
Testing and troubleshooting networks
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
Network Cabling
Network CablingNetwork Cabling
Network Cabling
 
Software and Networking tools
Software and Networking toolsSoftware and Networking tools
Software and Networking tools
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Installing and configuring computer System
Installing and configuring computer SystemInstalling and configuring computer System
Installing and configuring computer System
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer server
 
Introduction, Installation Operating System and Application
Introduction, Installation Operating System and ApplicationIntroduction, Installation Operating System and Application
Introduction, Installation Operating System and Application
 

Viewers also liked

Basic Network And Hardware Troubleshooting
Basic Network And Hardware TroubleshootingBasic Network And Hardware Troubleshooting
Basic Network And Hardware Troubleshooting
sl0wupl0ads
 
Basic computer troubleshooting
Basic computer troubleshootingBasic computer troubleshooting
Basic computer troubleshooting
dan0530
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshooting
Jerome Luison
 
Troubleshooting And Maintenance Fundamentals
Troubleshooting And Maintenance FundamentalsTroubleshooting And Maintenance Fundamentals
Troubleshooting And Maintenance Fundamentals
ricsanmae
 
Chapter 09 - Net Testing
Chapter 09 - Net TestingChapter 09 - Net Testing
Chapter 09 - Net Testing
phanleson
 
Testing for infra code using test-kitchen,docker,chef
Testing for infra code using  test-kitchen,docker,chefTesting for infra code using  test-kitchen,docker,chef
Testing for infra code using test-kitchen,docker,chef
kamalikamj
 

Viewers also liked (20)

Basic Network And Hardware Troubleshooting
Basic Network And Hardware TroubleshootingBasic Network And Hardware Troubleshooting
Basic Network And Hardware Troubleshooting
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the network
 
Basic computer troubleshooting
Basic computer troubleshootingBasic computer troubleshooting
Basic computer troubleshooting
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshooting
 
Troubleshooting And Maintenance Fundamentals
Troubleshooting And Maintenance FundamentalsTroubleshooting And Maintenance Fundamentals
Troubleshooting And Maintenance Fundamentals
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
Basic Computer Troubleshooting
Basic Computer TroubleshootingBasic Computer Troubleshooting
Basic Computer Troubleshooting
 
elec calc - electrical calculation Low and High Voltage software | BIM
elec calc - electrical calculation Low and High Voltage software | BIMelec calc - electrical calculation Low and High Voltage software | BIM
elec calc - electrical calculation Low and High Voltage software | BIM
 
PACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting MethodologyPACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting Methodology
 
Electrical projects
Electrical projectsElectrical projects
Electrical projects
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
Documentation Checklist
Documentation ChecklistDocumentation Checklist
Documentation Checklist
 
Pace IT Troubleshooting Theory
Pace IT Troubleshooting TheoryPace IT Troubleshooting Theory
Pace IT Troubleshooting Theory
 
Procedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting MaintenanceProcedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting Maintenance
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
Chapter 09 - Net Testing
Chapter 09 - Net TestingChapter 09 - Net Testing
Chapter 09 - Net Testing
 
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & MonitoringAWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
AWS DevOps Event - AWS Services enabling DevOps - Automated Testing & Monitoring
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
 
Testing for infra code using test-kitchen,docker,chef
Testing for infra code using  test-kitchen,docker,chefTesting for infra code using  test-kitchen,docker,chef
Testing for infra code using test-kitchen,docker,chef
 

Similar to The Basics of Network Troubleshooting

Network management
Network managementNetwork management
Network management
Mohd Arif
 

Similar to The Basics of Network Troubleshooting (20)

Server Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOVServer Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOV
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Network security
Network securityNetwork security
Network security
 
Networking Hardware Requirements.pptx
Networking Hardware Requirements.pptxNetworking Hardware Requirements.pptx
Networking Hardware Requirements.pptx
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary Margarat
 
Network
NetworkNetwork
Network
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Overview of computer
Overview of computerOverview of computer
Overview of computer
 
Network management
Network managementNetwork management
Network management
 
ch11.ppt
ch11.pptch11.ppt
ch11.ppt
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptx
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respond
 
Chp 01 pti - basic concepts of computer systems and information technology ...
Chp 01   pti - basic concepts of computer systems and information technology ...Chp 01   pti - basic concepts of computer systems and information technology ...
Chp 01 pti - basic concepts of computer systems and information technology ...
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure or
 

More from zaisahil (11)

Wide Area Network
Wide Area NetworkWide Area Network
Wide Area Network
 
Expending Networking
Expending NetworkingExpending Networking
Expending Networking
 
Remote Access
Remote AccessRemote Access
Remote Access
 
Administrating Your Network
Administrating Your NetworkAdministrating Your Network
Administrating Your Network
 
Configuring Network Clients
Configuring Network ClientsConfiguring Network Clients
Configuring Network Clients
 
Configuring The Network Server
Configuring The Network ServerConfiguring The Network Server
Configuring The Network Server
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Network
 
Real-World Networks
Real-World NetworksReal-World Networks
Real-World Networks
 
The Theoretical Network
The Theoretical NetworkThe Theoretical Network
The Theoretical Network
 
Network Components
Network ComponentsNetwork Components
Network Components
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

The Basics of Network Troubleshooting

  • 1. The Basics of Network Troubleshooting Chapter No.12
  • 2. Preventing Problem • Physical environment • Electrical environment • Viruses, Worm, Trojan Horses
  • 3. Problem in Physical Environment • Temperature • Air Quality • Magnetism
  • 4. Electrical Problems • Crosstalk – UTP – Solution STP • Noise – EMI – RFI – Solution • Properly ground equipment • Avoid placing cable close to possible EMI and RFI sources • Use shielding in cables whenever possible
  • 5. Electrical Problems • Static – ESD (Electrostatic discharge) – Solution • Always ground yourself and equipment • Never let anyone touch you while you are working • Never directly touch electrical leads of components • Always use antistatic bags • Transient – Transient also commonly called spikes, is high voltage burst of current. – Solution • Put the computer on its own circuit with a separate breaker. • Ensure that a computer is properly grounded
  • 6. Definition • A virus is a self- replicating program that spreads by inserting copies of itself into other executable code or documents made by crackers.
  • 7.
  • 8. Types of Viruses Macro Viruses Executable Viruses Backdoor Programs Boot Sector Viruses Macintosh Viruses Hoaxes Virus Information
  • 9. Macro Viruses • Most common type of virus on campus • Affect Microsoft Office documents • Written in Visual Basic for Applications • Generally harmless with a few destructive varients
  • 10. Executable Viruses • Second most common type of virus on campus • Written in programming languages and compiled into executable files • Generally more destructive
  • 11. Backdoor Programs • Sub-type of executable viruses • Allow anyone on the internet to remotely control the infected computer – Send and receive files – View the screen – Start programs – Monitor all keystrokes
  • 12. Boot Sector Viruses • Rare viruses • Similar to executable except the reside in the boot sector instead of as a file • Generally very destructive
  • 13. Macintosh Viruses • Most virus code will not affect Macintosh computers – Macro viruses target “C:” – Executables can not execute – Backdoors can not execute – Boot Sector Viruses can not infect HFS • Macintosh computers can be carriers of Macro Viruses
  • 14. Hoaxes • Warnings about viruses that do not exist • Characteristics – Claims the virus causes large amounts of damage but lack specifics on how it works – Claims unrealistic person (Bill Gates) or company (AOL) started the warning – Encourage you to pass it on to everyone you know
  • 15. Methods Viruses Use to Spread Parasites Worms Trojan Horses Booting
  • 16. Parasites • Imbed themselves into a program or data file • Spread to other files when the infected file is opened • Only spread to other computers when the files are shared
  • 17. Worms • Attempt to spread themselves to other computers instead of only infecting files on the local computer • Recent worms automatically send e-mail attachments containing copies of the virus
  • 18. Trojan Horses • Disguise themselves as usefull programs – Greetings cards – Games – Screen Savers • Modify system files while the ‘usefull’ program executes
  • 19. Booting • Boot sector viruses copy themselves to the boot sector of a disk • When the disk is used to boot a computer, the code is loaded into memory • The code resident in memory can be used to deliver the payload and to infect other disks
  • 20. How Anti-Virus Software Works • Automatically loaded at start-up time • Monitors all interaction with files • Looks for hexadecimal patterns within files. These patterns are defined by Virus Definition Files • Virus Definition Files must be updated regularly to ensure new viruses can be detected
  • 21. Guide to Networking Essentials, Fourth Edition 21 Preventing Problems with Network Management and Planning • Two ways to solve networking problems • Prevent them through planning and management – Called pre-emptive troubleshooting or trouble avoidance • Repair and control damage that already exists – Called troubleshooting
  • 22. Guide to Networking Essentials, Fourth Edition 22 Preventing Problems with Network Management and Planning (continued) • Combine network management and troubleshooting to form overall network plan – Include cable diagrams, cable layers, network capacity information, protocols and network standards, documentation on computer and network device configuration, software, and important files • Establish network policies and procedures – Include back-up methods, security, hardware and software standards, upgrade guidelines, and documentation
  • 23. Guide to Networking Essentials, Fourth Edition 23 Backing Up Network Data • To prevent data loss, develop comprehensive back-up program, including: – What data should be backed up and how often? – What type of backup will be performed, how often, and what time? – Who is responsible for performing backups? – Is backup system being tested regularly? – Is backup log complete? – Where is backed-up data stored (on-site and off-site)? • Table 13-1 shows several back-up methods
  • 24. Guide to Networking Essentials, Fourth Edition 24 Backup Methods
  • 25. Guide to Networking Essentials, Fourth Edition 25 Setting Security Policies • Security policies are part of network plan – Include both data and hardware security • Primary data security is username and passwords for all accounts, including: – How often users change passwords – Whether users can reuse same passwords – What character restrictions passwords have – Whether passwords have single or multiple sets of standards – How exceptions are defined and documented
  • 26. Guide to Networking Essentials, Fourth Edition 26 Setting Security Policies (continued) • Establish guidelines for resource access – Grant access only to users who require it – Grant minimum levels of access – Set special security requirements for dial-in accounts – Keep to a minimum the number of users who perform network administration tasks
  • 27. Guide to Networking Essentials, Fourth Edition 27 Setting Hardware and Software Standards • Set standards for all network components • Determine supported hardware manufacturers and operating systems, including versions • Determine what networking protocols and services will be used • Define server configurations and guidelines for new server installations • Evaluate standards at least once per quarter to keep network up to date
  • 28. Guide to Networking Essentials, Fourth Edition 28 Establishing Upgrade Guidelines • Establish guidelines for upgrades • Give users advance notice of changes • Try not to perform upgrades during working hours • First “pilot” upgrades with small group of astute network users to resolve problems • Have plan to undo upgrade installation if necessary
  • 29. Guide to Networking Essentials, Fourth Edition 29 Maintaining Documentation • Address list • Cable map • Contact list • Equipment list • Network history • Network map • Network hardware configuration • Policies and procedures • Server configuration • Software configuration • Software licensing • User administration Keep complete up-to-date documentation of network, both in hard copy and in electronic form, including:
  • 30. Guide to Networking Essentials, Fourth Edition 30 Performing Pre-emptive Troubleshooting • International Organization for Standardization (ISO) identifies five categories for pre-emptive network troubleshooting: – Account management – Configuration management – Fault management – Performance management – Security management
  • 31. Guide to Networking Essentials, Fourth Edition 31 Practicing Good Customer-Relation Skills • Users are customers, and the reason network personnel have jobs – Best source of information when something goes wrong with network – Develop special relationships with adept users • Develop guidelines about user interaction – Include how to question and respond to users, handle irate users, and general user communication etiquette
  • 32. Guide to Networking Essentials, Fourth Edition 32 Using Network-Monitoring Utilities • Many programs help with network management – Identify conditions that may lead to problems, prevent network failures, and troubleshoot problems • Use network management utilities – Learn which statistics to monitor – Establish baseline for network performance – Monitor changes
  • 33. Guide to Networking Essentials, Fourth Edition 33 Using Network-Monitoring Utilities (continued) • Use network management utilities in advanced operating systems or from third-party sources • Gather information about: – Events – System usage statistics – System performance statistics
  • 34. Guide to Networking Essentials, Fourth Edition 34 Using Network-Monitoring Utilities (continued) • Use information from utilities to help: – Identify network devices that create bottlenecks – Provide information to forecast growth and plan capacity requirements – Develop plans to improve network performance – Monitor events that arise from software or hardware changes – Monitor trends in network traffic and utilization • Figure 13-1 shows Windows XP Performance Monitor
  • 35. Guide to Networking Essentials, Fourth Edition 35 Windows XP Performance Monitor
  • 36. Guide to Networking Essentials, Fourth Edition 36 Creating a Network Baseline • Defines point of reference for measuring network performance when problem occurs • Create baseline over time when no problems are evident on network and repeat baseline periodically, especially after significant changes to network • Compare network performance with baseline to help identify: – Daily network utilization patterns – Possible network bottlenecks – Heavy usage patterns – Protocol traffic patterns
  • 37. Guide to Networking Essentials, Fourth Edition 37 Monitoring with SNMP • Simple Network Management Protocol (SNMP) is part of TCP/IP protocol suite • Software agents for each network device monitor traffic and device status – Store information in management information base (MIB) • See Figure 13-2
  • 38. Guide to Networking Essentials, Fourth Edition 38 SNMP Network Monitoring and Managing
  • 39. Guide to Networking Essentials, Fourth Edition 39 Monitoring with SNMP (continued) • SNMP monitors agents and collects data in MIBs to generate statistics or charts about network • Can set thresholds for SNMP managers – Generate alerts when thresholds are exceeded • Manage network components such as bridges and routers • Can interrogate devices and make remote configuration changes
  • 40. Guide to Networking Essentials, Fourth Edition 40 Using Remote Monitoring (RMON) for Advanced Monitoring • Two versions of RMON: – RMON1 captures data and collects statistics at Data Link and Physical layers – RMON2 collects and analyzes traffic at Network and higher layers • Some devices are RMON-capable – Contain software agents, called probes, that collect data and communicate with management station using SNMP
  • 41. Guide to Networking Essentials, Fourth Edition 41 Network Troubleshooting • In spite of planning, monitoring, and other pre- emptive techniques, problems do occur • Be ready to troubleshoot network to diagnose and fix problems, by using: – Troubleshooting methodology – Structured approach – Special tools
  • 42. Guide to Networking Essentials, Fourth Edition 42 Troubleshooting Methodology • Stay calm and use clear head to assess problems • Steps to help troubleshoot common network problems include: – Eliminate potential user errors – Verify physical connections are working – Verify status of any suspect NICs – Restart computer
  • 43. Guide to Networking Essentials, Fourth Edition 43 Structured Approach • Five-step structured troubleshooting approach for tackling complex network problems: – Set problem’s priority – Collect information about problem – Develop list of possible causes – Test each hypothesis to isolate actual cause – For each potential cause, attempt at least one solution
  • 44. Guide to Networking Essentials, Fourth Edition 44 Prioritize • Determine scope of problem – Does it affect single computer or more • If multiple problems, assign each a priority • Tackle them in decreasing order of severity, starting with most severe problem
  • 45. Guide to Networking Essentials, Fourth Edition 45 Collect Information • Ask user specific questions to obtain details • Scan network for obvious problems or failures • Review previous network problems to determine if problem is recurrent • Determine scope of problem by dividing network into small parts and checking each • Create troubleshooting checklist to make task more manageable
  • 46. Guide to Networking Essentials, Fourth Edition 46 Establish Possible Causes • Create list of possible causes • Rank them in order of likelihood • Start with most likely cause
  • 47. Guide to Networking Essentials, Fourth Edition 47 Isolate the Problem • Make only one change at a time and test it • Be sure changes do not introduce new problem • Document all hardware, software, or configuration changes
  • 48. Guide to Networking Essentials, Fourth Edition 48 Test Results • After each change, test results to see if problem is fixed or new problem is introduced • When problem is solved, document steps that implemented solution – Include information in network documentation • If change does not fix problem, move to next possible cause • Sometimes a change reveals another deeper problem
  • 49. Guide to Networking Essentials, Fourth Edition 49 Using Special Tools • Most problems occur at lower layers of OSI model where they are more difficult to troubleshoot • Variety of special troubleshooting tools help diagnose problems, including: – Digital voltmeter (DVM) – Time-domain reflectometer (TDR) – Basic and advanced cable testers – Oscilloscopes – Network monitors – Protocol analyzers
  • 50. Guide to Networking Essentials, Fourth Edition 50 Digital Voltmeter (DVM) • Also called volt-ohm meter (VOM) • Basic electrical measuring device • Can measure cable’s resistance to determine if it is broken • Can detect short circuit in cable
  • 51. Guide to Networking Essentials, Fourth Edition 51 Time-Domain Reflectometer (TDR) • Determines if cable has break or short • By reflecting back from break, can pinpoint how far from device break occurs – High quality TDR can come within few inches of break • May be used with fiber-optic and electrical cables • During new installation, use TDR to document actual lengths of cables • Standard part of most advanced cable testers
  • 52. Guide to Networking Essentials, Fourth Edition 52 Basic Cable Testers • Test correct termination of twisted-pair cable • Test continuity of coaxial cable • Excellent for checking patch cables • Do not detect breaks in cables • Do not check for attenuation, noise, or other performance problems
  • 53. Guide to Networking Essentials, Fourth Edition 53 Advanced Cable Testers • Combine characteristics of DVM, TDR, and protocol analyzer • Detect where break is located in cable • Gather information about cable’s impedance, resistance, and attenuation • Function at Physical and Data Link layers of OSI model • Can measure frame counts, collisions, congestion, beaconing information, or broadcast storms
  • 54. Guide to Networking Essentials, Fourth Edition 54 Oscilloscopes • Measure signal voltage over time • Identify shorts, sharp bends or crimps, cable breaks, and attenuation problems
  • 55. Guide to Networking Essentials, Fourth Edition 55 Network Monitors • Software that tracks network traffic, including packet types, errors, traffic to and from each computer • Can generate reports and graphs • Included with Windows NT, 2000/2003 Server versions and also available from third parties
  • 56. Guide to Networking Essentials, Fourth Edition 56 Protocol Analyzers • Most advanced network troubleshooting device • Evaluates overall health of network • Monitors all traffic in real time • Captures traffic and decodes packets • Looks inside packets to determine problems • Generates network statistics • Can establish baseline for network and troubleshoot problems • Most advanced ones combine hardware and software • Especially good for Layer 3 (Network) devices • Some protocol analysis capability in Window’s Network Monitor
  • 57. Guide to Networking Essentials, Fourth Edition 57 Network Support Resources • Variety of network support resource formats – Software products – Online services – Subscription services – Printed material
  • 58. Guide to Networking Essentials, Fourth Edition 58 Microsoft TechNet • Microsoft Technical Information Network (TechNet) is subscription service – Includes monthly set of CD-ROMs with product information, technical support updates, software drivers, and online tutorials • Valuable tool for gathering information and diagnosing network problems • Easy-to-use interface • Online version is free
  • 59. Guide to Networking Essentials, Fourth Edition 59 Common Troubleshooting Situations • Some of most common network problems involve: – Cabling and related components – Power fluctuations – Upgrades – Poor network performance
  • 60. Guide to Networking Essentials, Fourth Edition 60 Cabling and Related Components • Majority of network problems occur at Physical layer and involve cables, connectors, and NICs – Make sure cable is properly connected and correct kind – Be sure length is within maximum limit for type of medium – Check LEDs on NIC, if available – Exchange NIC with known working one – Use PING utility to check connectivity to other computers
  • 61. Guide to Networking Essentials, Fourth Edition 61 Power Fluctuations • Caused by electrical storm or power failure • Adversely affect computers • Afterwards, verify that servers are up and functioning • Use Uninterruptible Power Supplies (UPSs) – Especially important for servers – Provide battery power so computers can be brought down without data loss – Some perform automatic shutdowns
  • 62. Guide to Networking Essentials, Fourth Edition 62 Upgrades • Constantly changing technology makes it necessary to upgrade equipment and software frequently • Some important considerations when performing network upgrades: – Keep current and do one upgrade at a time – Ignoring upgrades may require complete network overhaul – Test any upgrade before deploying it – Inform users about upgrade: when it will occur, what is involved, and what to expect
  • 63. Guide to Networking Essentials, Fourth Edition 63 Poor Network Performance • If network slows over time, ask these questions to pinpoint causes: – What has changed? – Have new equipment or applications been added? – Is someone playing electronic games across network? – Are there new users on network? How many? – Is other new equipment, such as a generator, causing interference near network? • May be necessary to expand network to increase current capacity