Search:

Type: Posts; User: mindreader

Page 1 of 3 1 2 3

Search: Search took 0.05 seconds.

  1. Replies
    29
    Views
    17,370

    Summary In this guide , you learned about...

    Summary

    In this guide , you learned about the proper methods of troubleshooting-network problems. In the first section, you learned the proper method to start to fix any network problem by...
  2. Replies
    29
    Views
    17,370

    Check for Viruses

    Check for Viruses

    Many troubleshooters overlook virus scanning because they assume that the network virus-checking software should have picked up any viruses. We’re reminded by the network...
  3. Replies
    29
    Views
    17,370

    Don’t Overlook Cable Problems

    Don’t Overlook Cable Problems

    Cables, generally speaking, work fine once they are installed properly. Rarely is the cabling system the problem, unless someone has made some change to it. If you...
  4. Replies
    29
    Views
    17,370

    Don’t Overlook Physical Conditions

    Don’t Overlook Physical Conditions

    You want to make sure that from a network design standpoint, the physical environment for a server is optimized for placement, temperature, and humidity. When...
  5. Replies
    29
    Views
    17,370

    Check the Software Configuration

    Often, network problems can be traced to software configuration (as with our DNS configuration example earlier in this chapter). When you are checking for software problems, don’t forget to check...
  6. Replies
    29
    Views
    17,370

    Troubleshooting Tips

    Now that we have covered the basics of network troubleshooting, we should go over a few troubleshooting tips. These tips will give you more “ammo” while you’re hunting for network problems and...
  7. Replies
    29
    Views
    17,370

    Software Troubleshooting Tools

    In addition to these hardware troubleshooting tools, you can use software programs to gain information about the current health and state of the network. These tools fall into two main categories:
    ...
  8. Replies
    29
    Views
    17,370

    Hardware Troubleshooting Tools

    In addition to manufacturer-provided troubleshooting tools, there are a few hardware devices we can use to troubleshoot the network. These are actual devices that you can use during the...
  9. Replies
    29
    Views
    17,370

    Manufacturers’ Troubleshooting Resources

    In addition to viewing log files, you can use several types of troubleshooting tools that manufacturers make available for their network operating systems. You can use these resources to augment your...
  10. Replies
    29
    Views
    17,370

    The Security Log

    This log tracks security events specified by the domain’s Audit policy. The Audit policy is set in User Manager for Domains and specifies which security items will be tracked in Event Viewer. To...
  11. Replies
    29
    Views
    17,370

    The Application Log

    This log is similar to the other two logs, except that it tracks events for network services and applications (for example, SQL Server and other Back-Office products). It uses the same event types...
  12. Replies
    29
    Views
    17,370

    The System Log

    This log file tracks just about every event that occurs on that computer. It is similar to NetWare’s SYS$LOG.ERR file. However, whereas the SYS$LOG.ERR file tracks many categories of errors, the...
  13. Replies
    29
    Views
    17,370

    Windows NT 4 Log Files

    Windows NT, like other network operating systems, employs comprehensive error and informational logging routines. Every program and process theoretically could have its own logging utility, but...
  14. Replies
    29
    Views
    17,370

    The SYS$LOG.ERR File

    The general Server Log file, found in the SYS:SYSTEM directory, lists any errors that occur on the server, including Abends and NDS errors and the time and date of their occurrence. An error in the...
  15. Replies
    29
    Views
    17,370

    The ABEND.LOG File

    This log file registers all Abends on a NetWare server. An Abend (ABnormal END) is an error condition that can halt the proper operation of the Net-Ware server. Abends can be serious enough to lock...
  16. Replies
    29
    Views
    17,370

    The CONSOLE.LOG File

    The Console Log file ( CONSOLE.LOG) keeps a history of all errors and information that have been displayed on the server’s console. It is located in the SYS:\ETC directory on the server and is...
  17. Replies
    29
    Views
    17,370

    The Troubleshooter’s Resources

    In the process of troubleshooting a workstation, a server, or other network component, you have many resources at your disposal. In this section, we’ll take a brief look at some of them. Those you...
  18. Replies
    29
    Views
    17,370

    Step 5: Implement a Solution In this step,...

    Step 5: Implement a Solution

    In this step, you implement the solution. In our example, we need to reconfigure DNS on the workstation by following these steps:


    Choose Start - Settings -...
  19. Replies
    29
    Views
    17,370

    Step 3: Establish What Has Changed If you can...

    Step 3: Establish What Has Changed

    If you can reproduce the problem, your next step is to attempt to determine the cause by determining what has changed. Drawing on your knowledge of networking,...
  20. Replies
    29
    Views
    17,370

    Troubleshooting Steps

    In the Network+ troubleshooting model, there are eight steps:


    Establish symptoms.
    Identify the affected area.

    Establish what has changed.

    Select the most probable cause.
  21. Replies
    29
    Views
    17,370

    Cabling Issues

    Cabling Issues

    After you determine whether the problem is related to the whole network, to a single segment, or to a single workstation, you must determine whether the problem is related to...
  22. Replies
    29
    Views
    17,370

    Which Segments of the Network Are Affected?

    Which Segments of the Network Are Affected?

    Making this determination can be tough. If multiple segments are affected, the problem could be a network address conflict. As you may remember...
  23. Replies
    29
    Views
    17,370

    Is It a Workstation or a Server Problem?

    Is It a Workstation or a Server Problem?

    Troubleshooting this problem involves first determining whether one person or a group of people are affected. If only one person is affected, think...
  24. Replies
    29
    Views
    17,370

    Is Hardware or Software Causing the Problem?

    A hardware problem typically manifests itself as a device in your computer that fails to operate correctly. You can usually tell that a hardware failure has occurred because you will try to use that...
  25. Replies
    29
    Views
    17,370

    The Correct Login Procedure and Rights

    The Correct Login Procedure and Rights

    To gain access to the network, users must follow the correct login procedure exactly. If they don’t, they will be denied access. Considering everything...
  26. Replies
    29
    Views
    17,370

    Narrowing Down the Problem

    Troubleshooting a network problem can be daunting. That’s why it’s best to start by trying to narrow down the source of the problem. You do this by checking a few key areas, beginning with the...
  27. Replies
    29
    Views
    17,370

    Networking Guide 9 - Network Troubleshooting

    Networking Guide 9 - Network Troubleshooting

    There is no doubt about it. The only way to get good at troubleshooting computers and networks is the same way to get good at any other art:...
  28. Summary

    Summary

    In this guide, you learned about fault tolerance and disaster recovery. Fault tolerance is the ability of a system to resist failures and faults and to recover from them by itself....
  29. Software Patches

    Software Patches

    Patches, fixes, service packs, and updates are all the same thing—free software revisions. These are intermediary solutions until a new version of the product is released. A...
  30. Scanning for Viruses

    Scanning for Viruses

    An antivirus scan is the process in which an antivirus program examines the computer suspected of having a virus and eradicates any viruses it finds. There are two types of...
  31. Updating Antivirus Components

    Updating Antivirus Components

    A typical antivirus program consists of two components:

    The definition files
    The engine
    The definition files list the various viruses, their type and...
  32. Virus Protection

    Virus Protection

    A virus is a program that causes malicious change in your computer and makes copies of itself. Sophisticated viruses encrypt and hide themselves to thwart detection. There are...
  33. Tape Rotation Schedule

    Tape Rotation Schedule

    Rotating backup tapes is the most practical way to manage a tape backup scheme, since the costs of using a new tape each day are prohibitive. Although tapes are the...
  34. Backup Utilities

    A backup utility is a software program that can archive the data on a hard disk to a removable medium. Backup utilities can compress data before they store it, making it more efficient to use a...
  35. Backup Media Options

    Backup Media Options

    When you back up your network’s data, you must have something on which to store that data, which is called the backup medium. You have several options, including:


    ...
  36. Backup Considerations

    Backup Considerations

    Although you can never be completely prepared for every natural disaster or human foible that can bring down your network, you can make sure that you have a solid backup...
  37. Redundant Array of Inexpensive (or Independent) Disks (RAID)

    Redundant Array of Inexpensive (or Independent) Disks (RAID)

    RAID is a technology that uses an array of less expensive hard disks instead of one enormous hard disk and provides several methods...
  38. Disk Striping

    Disk Striping

    From a performance point of view, writing data to a single drive is slow. When three drives are configured as a single volume, information must fill the first drive before it can go...
  39. Disk Duplexing

    Disk Duplexing

    As with mirroring, duplexing also saves data to a mirror drive. In fact, the only major difference between duplexing and mirroring is that duplexing uses two separate disk...
  40. Disk Mirroring

    Disk Mirroring

    Mirroring a drive means designating a hard-disk drive in the computer as a mirror or duplicate to another, specified drive. The two drives are attached to a single disk controller....
  41. Disk System Fault Tolerance

    hard disk is a temporary storage device, and every hard disk will eventually fail. The most common problem is a complete hard-disk failure (also known as a hard-disk crash). When this happens, all...
  42. Line Conditioners

    Line Conditioners

    The AC voltage that powers our everyday devices comes from power sources usually located far from where we use it. The power is conducted through wires and stepping stations...
  43. Battery Backup Systems

    Battery Backup Systems

    Battery backup systems protect computer systems from power failures. There are several different types of power failures, including brownouts and blackouts. A brownout is...
  44. Surge Protectors

    Surge Protectors

    Surge protectors (also commonly referred to as surge suppressors ) are typically power blocks or power strips with electronics that limit the amount of voltage, current (amps),...
  45. Power Management

    Power Management

    A key element of any fault tolerance plan is a power management strategy. Electricity powers the network, switches, hubs, PCs, and computer servers. Variations in power can cause...
  46. Warm Site and Cold Site

    Warm Site

    In a warm site (also called a nearline site ), the network service and data are available most of the time (more than 85 percent of the time). The data and services are less critical...
  47. Assessing Fault Tolerance and Disaster Recovery Needs

    Assessing Fault Tolerance and Disaster Recovery Needs

    Before implementing fault tolerance or disaster recovery, you should determine how critical your systems are to daily business operations....
  48. Networking Guide 8 - Fault Tolerance and Disaster Recovery

    Computers are not perfect. They can (and do) have problems that affect their users’ productivity. These problems range from small errors to total system failure. Errors and failures can be the...
  49. Summary

    Summary

    In this guide, you learned about various technologies used to provide access to a network as well as those used to secure a network. You learned about the various types of clients that...
  50. Breaking Policy

    A security policy is not effective unless it is enforced, and enforced consistently. You cannot exempt certain individuals from policies or the consequences of breaking them. Your network users need...
Results 1 to 50 of 124
Page 1 of 3 1 2 3
Page generated in 1,711,664,517.42738 seconds with 25 queries