Summary
In this guide , you learned about the proper methods of troubleshooting-network problems. In the first section, you learned the proper method to start to fix any network problem by...
Type: Posts; User: mindreader
Summary
In this guide , you learned about the proper methods of troubleshooting-network problems. In the first section, you learned the proper method to start to fix any network problem by...
Check for Viruses
Many troubleshooters overlook virus scanning because they assume that the network virus-checking software should have picked up any viruses. We’re reminded by the network...
Don’t Overlook Cable Problems
Cables, generally speaking, work fine once they are installed properly. Rarely is the cabling system the problem, unless someone has made some change to it. If you...
Don’t Overlook Physical Conditions
You want to make sure that from a network design standpoint, the physical environment for a server is optimized for placement, temperature, and humidity. When...
Often, network problems can be traced to software configuration (as with our DNS configuration example earlier in this chapter). When you are checking for software problems, don’t forget to check...
Now that we have covered the basics of network troubleshooting, we should go over a few troubleshooting tips. These tips will give you more “ammo” while you’re hunting for network problems and...
In addition to these hardware troubleshooting tools, you can use software programs to gain information about the current health and state of the network. These tools fall into two main categories:
...
In addition to manufacturer-provided troubleshooting tools, there are a few hardware devices we can use to troubleshoot the network. These are actual devices that you can use during the...
In addition to viewing log files, you can use several types of troubleshooting tools that manufacturers make available for their network operating systems. You can use these resources to augment your...
This log tracks security events specified by the domain’s Audit policy. The Audit policy is set in User Manager for Domains and specifies which security items will be tracked in Event Viewer. To...
This log is similar to the other two logs, except that it tracks events for network services and applications (for example, SQL Server and other Back-Office products). It uses the same event types...
This log file tracks just about every event that occurs on that computer. It is similar to NetWare’s SYS$LOG.ERR file. However, whereas the SYS$LOG.ERR file tracks many categories of errors, the...
Windows NT, like other network operating systems, employs comprehensive error and informational logging routines. Every program and process theoretically could have its own logging utility, but...
The general Server Log file, found in the SYS:SYSTEM directory, lists any errors that occur on the server, including Abends and NDS errors and the time and date of their occurrence. An error in the...
This log file registers all Abends on a NetWare server. An Abend (ABnormal END) is an error condition that can halt the proper operation of the Net-Ware server. Abends can be serious enough to lock...
The Console Log file ( CONSOLE.LOG) keeps a history of all errors and information that have been displayed on the server’s console. It is located in the SYS:\ETC directory on the server and is...
In the process of troubleshooting a workstation, a server, or other network component, you have many resources at your disposal. In this section, we’ll take a brief look at some of them. Those you...
Step 5: Implement a Solution
In this step, you implement the solution. In our example, we need to reconfigure DNS on the workstation by following these steps:
Choose Start - Settings -...
Step 3: Establish What Has Changed
If you can reproduce the problem, your next step is to attempt to determine the cause by determining what has changed. Drawing on your knowledge of networking,...
In the Network+ troubleshooting model, there are eight steps:
Establish symptoms.
Identify the affected area.
Establish what has changed.
Select the most probable cause.
Cabling Issues
After you determine whether the problem is related to the whole network, to a single segment, or to a single workstation, you must determine whether the problem is related to...
Which Segments of the Network Are Affected?
Making this determination can be tough. If multiple segments are affected, the problem could be a network address conflict. As you may remember...
Is It a Workstation or a Server Problem?
Troubleshooting this problem involves first determining whether one person or a group of people are affected. If only one person is affected, think...
A hardware problem typically manifests itself as a device in your computer that fails to operate correctly. You can usually tell that a hardware failure has occurred because you will try to use that...
The Correct Login Procedure and Rights
To gain access to the network, users must follow the correct login procedure exactly. If they don’t, they will be denied access. Considering everything...
Troubleshooting a network problem can be daunting. That’s why it’s best to start by trying to narrow down the source of the problem. You do this by checking a few key areas, beginning with the...
Networking Guide 9 - Network Troubleshooting
There is no doubt about it. The only way to get good at troubleshooting computers and networks is the same way to get good at any other art:...
Summary
In this guide, you learned about fault tolerance and disaster recovery. Fault tolerance is the ability of a system to resist failures and faults and to recover from them by itself....
Software Patches
Patches, fixes, service packs, and updates are all the same thing—free software revisions. These are intermediary solutions until a new version of the product is released. A...
Scanning for Viruses
An antivirus scan is the process in which an antivirus program examines the computer suspected of having a virus and eradicates any viruses it finds. There are two types of...
Updating Antivirus Components
A typical antivirus program consists of two components:
The definition files
The engine
The definition files list the various viruses, their type and...
Virus Protection
A virus is a program that causes malicious change in your computer and makes copies of itself. Sophisticated viruses encrypt and hide themselves to thwart detection. There are...
Tape Rotation Schedule
Rotating backup tapes is the most practical way to manage a tape backup scheme, since the costs of using a new tape each day are prohibitive. Although tapes are the...
A backup utility is a software program that can archive the data on a hard disk to a removable medium. Backup utilities can compress data before they store it, making it more efficient to use a...
Backup Media Options
When you back up your network’s data, you must have something on which to store that data, which is called the backup medium. You have several options, including:
...
Backup Considerations
Although you can never be completely prepared for every natural disaster or human foible that can bring down your network, you can make sure that you have a solid backup...
Redundant Array of Inexpensive (or Independent) Disks (RAID)
RAID is a technology that uses an array of less expensive hard disks instead of one enormous hard disk and provides several methods...
Disk Striping
From a performance point of view, writing data to a single drive is slow. When three drives are configured as a single volume, information must fill the first drive before it can go...
Disk Duplexing
As with mirroring, duplexing also saves data to a mirror drive. In fact, the only major difference between duplexing and mirroring is that duplexing uses two separate disk...
Disk Mirroring
Mirroring a drive means designating a hard-disk drive in the computer as a mirror or duplicate to another, specified drive. The two drives are attached to a single disk controller....
hard disk is a temporary storage device, and every hard disk will eventually fail. The most common problem is a complete hard-disk failure (also known as a hard-disk crash). When this happens, all...
Line Conditioners
The AC voltage that powers our everyday devices comes from power sources usually located far from where we use it. The power is conducted through wires and stepping stations...
Battery Backup Systems
Battery backup systems protect computer systems from power failures. There are several different types of power failures, including brownouts and blackouts. A brownout is...
Surge Protectors
Surge protectors (also commonly referred to as surge suppressors ) are typically power blocks or power strips with electronics that limit the amount of voltage, current (amps),...
Power Management
A key element of any fault tolerance plan is a power management strategy. Electricity powers the network, switches, hubs, PCs, and computer servers. Variations in power can cause...
Warm Site
In a warm site (also called a nearline site ), the network service and data are available most of the time (more than 85 percent of the time). The data and services are less critical...
Assessing Fault Tolerance and Disaster Recovery Needs
Before implementing fault tolerance or disaster recovery, you should determine how critical your systems are to daily business operations....
Computers are not perfect. They can (and do) have problems that affect their users’ productivity. These problems range from small errors to total system failure. Errors and failures can be the...
Summary
In this guide, you learned about various technologies used to provide access to a network as well as those used to secure a network. You learned about the various types of clients that...
A security policy is not effective unless it is enforced, and enforced consistently. You cannot exempt certain individuals from policies or the consequences of breaking them. Your network users need...