Premium Essay

Best Practices for Network Troubleshooting

In:

Submitted By Squeaky21
Words 541
Pages 3
Best Practices for Network Troubleshooting
Valance Baltimore
NTC/405
July 27, 2015
Bradley Rush

Best Practices for Network Troubleshooting
The article that I found is titled Top 10 Basic Network Troubleshooting Tools Every IT Pro Should Know (2011). This article list ten basic troubleshooting tips that could help an IT professional determine the reason for a failed network connection.
Let’s start with the most commonly used network tool, Ping. The Ping utility is used to provide a connectivity test between the requesting host and the destination host. Ping is done through the Internet Control Message Protocol (ICMP), by sending an echo packet to a destination host and then listens for a response from that host. This utility is used to help determine where the connection problem may be, in the office or within the network provider’s network.
After the Ping utility has been performed to determine the basic connectivity, and then typically the next step would be the tracert/traceroute utility is used. This utility can determine the path to the destination host and the route the packet takes to get there, and the response time of the intermediate host. Tracert is window based and traceroute is Linux based.
According to Wilkins (2011) one of the most important things that must be completed when troubleshooting a network is to find out the specific IP configuration of the affected hosts. If the address is configured statically you may already know this information, but if it configured dynamically, the address of the host can potentially change often. To determine this information you can use the ipconfig (Windows) or ifconfig (Linux) utility.
Some common networking issues are centered around issues with Dynamic Name System (DNS) resolution issues. DNS is used by the internet to resolve domain names to commonly unknown IP addresses. If the system does not

Similar Documents

Free Essay

Spur

...Appendix A Mapping Course Content to the CompTIA A+ Essentials 220-701 Exam Objectives Exam Objective | A+ Certification Lesson and Topic Reference | A+ Certification Activity Reference | Domain 1.0 Hardware | 1.1 Categorize storage devices and backup media | * FDD | Personal Computer Components, Storage Devices | | * HDD | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state vs. magnetic | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Optical drives | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * CD / DVD / RW / Blu-Ray | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Removable storage | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Tape drive | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state (e.g. thumb drive, flash, SD cards, USB) | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices...

Words: 6966 - Pages: 28

Premium Essay

House

...ITS Job Description Job title: Senior Network Engineer Department: Information Systems Office location: Boston, MA Reports to: Director of Network & Security Description The Senior Network Engineer’s role is to ensure the stability and integrity of in-house storage, virtualization, data, and wireless network services. In addition, the Network Engineer is responsible for the configuration, installation, monitoring, maintenance, upgrade patching and associated troubleshooting of Roxbury Community College systems and network infrastructures. This individual will also analyze and resolve network hardware and software problems in a timely and accurate fashion, and provide end user training where required. Responsibilities Performs daily network maintenance and management of network resources including servers, storage, virtualization, routers and switches Deploy company LANs, WANs, and wireless networks, including servers (rack and blade), storage, routers, switches, and other hardware Configure networks and systems to ensure their smooth and reliable operation for fulfilling business objectives and processes Monitor performance and troubleshoot problem areas as needed Create and maintain documentation as it relates to network configuration, systems, processes, and service records Ensure network connectivity of all servers, workstations, telephony equipment, and other network appliances Conduct research on network products, services, protocols, and standards...

Words: 467 - Pages: 2

Premium Essay

John

...run chkdsk. 2. You are training a new server administrator and are discussing common boot problems. Which of the following do you mention? (Choose all that apply.) Answer: a. disk read errors, b. corrupted boot file, c. corrupted partition table, and d. disk failure on a drive containing boot files 3. You’ve just added a new monitor and driver to your server, but when you reboot, the display on the monitor is unreadable and distorted. Which of the following can you do to help troubleshoot the problem? Answer: c. Re-boot into the Enable low-resolution video (640x480) mode. 4. Name three problem-solving strategies for addressing a problem with Windows Server 2008. Answer: Any three of: understanding how a server and the network interact, training your users to help you solve problems, solving problems step by step, and tracking problems and solutions 5. The security log contains hundreds of entries. However, you only want to track the audited logon activities of a single user. Which of the following can you use? Answer: a. Set up a filter. 6. Name five elements that compose system state data. What command-line command can you use to backup system state data? Answer: Any five of: system and boot files, protected system files, Active Directory, SYSVOL folder, Registry, COM+ Class Registration information, DNS zones, certificate information, server cluster data, IIS metadirectory. Also, the wbadmin command is used to back up system...

Words: 3422 - Pages: 14

Free Essay

Study Guide

...Chapter 12 WLAN Troubleshooting IN ThIs chApTer, you WILL LeArN AbouT The foLLoWINg: ÛÛ Layer 2 retransmissions NÛ RF interference Multipath Adjacent cell interference Low SNR Mismatched power settings Near/far Hidden node NÛ NÛ NÛ NÛ NÛ NÛ ÛÛ 802.11 coverage considerations NÛ Dynamic rate switching Roaming Layer 3 roaming Co-channel interference Channel reuse/multiple channel architecture Single channel architecture Capacity vs. coverage Oversized coverage cells Physical environment NÛ NÛ NÛ NÛ NÛ NÛ NÛ NÛ ÛÛ Voice vs. data ÛÛ Performance ÛÛ Weather Copyright © 2009 John Wiley & Sons, Inc. Diagnostic methods that are used to troubleshoot wired 802.3 networks should also be applied when troubleshooting a wireless local area network (WLAN). A bottoms-up approach to analyzing the OSI reference model layers also applies to wireless networking. A wireless networking administrator should always try to first determine whether problems exist at layer 1 and layer 2. As with most networking technologies, most problems usually exist at the Physical layer. Simple layer 1 problems such as nonpowered access points or client card driver problems are often the root cause of connectivity or performance issues. Because WLANs use radio frequencies to deliver data, troubleshooting a WLAN offers many unique layer 1 challenges not found in a typical wired environment. The bulk of this chapter discusses the numerous potential problems...

Words: 16450 - Pages: 66

Premium Essay

Creating and Configuring

...Creating and Configuring Robert Collazo Jr. Rasmussen College Creating and Configuring Describe which factors must be considered when planning and designing a system image? The factors that need to be considered when planning and designing an image are what you are going to be what the image is going to be used for. For instance if was working in an office setting where everyone uses the same software and is on a network. There are many ways to design and deploy an image one is called DISM which means, Deployment Image Servicing and Management tool replaces the pkgmgr, PEImg, and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a more efficient and standardized way, eliminating the source of many of the frustrations experienced by current users of these tools. Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. Next we have Windows SIM Windows System Image Manager creates and manages unattended Windows Setup answer files in a graphical user interface. Windows SIM provides the following benefits that enable you to: 1. Quickly create an unattended answer file. ...

Words: 1255 - Pages: 6

Premium Essay

Disseminating Organizational It Security and Troubleshooting Best Practices

...Disseminating Organizational IT Security and Troubleshooting Best Practices Patrick Peck CIS329: Administering Desktop Clients Professor Cynthia Orth Strayer University 17 March 2013 Disseminating Organizational IT Security and Troubleshooting Best Practices The organization being analyzed here is a video store that works within a semi-commercial area of a metropolitan city. The video store aims to enhance its overall IT infrastructure and increase security of the videos/hardware/software through the implementation of useful IT infrastructures. The problem, thus, is that there is no real information technology security measure employed in the video shop in terms of user authentication and similar processes. There is very little awareness of the necessary IT security measures amongst the current management heads which is why they need an effective IT security plan and structure to implement to ensure there is no copyright infringement and stealing from their shop. The problem of having no IT infrastructure within the video store is that it directly affects all products and videos that are at the disposal of the customers online as well as on-site. The guidelines associated to the informational security strategy should incorporate contingency actions which will facilitate the video shop to endure any discrepancy or calamity and tackle it audaciously. Actions like incorporating data storage and extraction with the use of data-warehousing and data-mining techniques...

Words: 2912 - Pages: 12

Premium Essay

Unit

...Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could be (but are not limited to): Install/maintain/upgrade site LAN cabling/wiring Survey, inventory and document networking layout and assets Install, configure and/or support Windows 7 desktop as network clients Install, configure and/or support Windows Server 2008 for a network Install, configure...

Words: 6762 - Pages: 28

Premium Essay

Trying to Join Site

...COURSE SUMMARY COURSE DESCRIPTION This course explores foundational topics related to information technology. Topics examined include computing devices, hardware, software, operating systems, computer networks, security, and computer programming. Logical problem solving, troubleshooting, and maintenance of computer systems are also introduced. MAJOR INSTRUCTIONAL AREAS 1. Computer History and Fundamentals 2. Hardware 3. Operating Systems 4. Basic Networking 5. Basic Security 6. Software 7. Basic Programming 8. Web Technologies 9. Troubleshooting COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Identify the evolution of computers and different types of computers. 2. Convert numbers between binary, decimal, and hexadecimal number systems. 3. Explain the purpose, functions, and characteristics of a CPU. 4. Describe the physical components of a computer and various input and output devices, including storage and memory. 5. Describe the function of BIOS and the booting process of a computer. 6. Describe basic operating system architecture, its components, and storage management. © ITT Educational Services, Inc. All Rights Reserved. [2] 6/15/15 IT1115 Introduction to Information Technology Syllabus 7. Describe basic types of computer network topologies and connections, protocols, and services used on the Internet. 8. Describe virtual computing and virtual networking concepts. 9. Describe fundamental cloud computing architectures and services...

Words: 12527 - Pages: 51

Premium Essay

Nt2640

...affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport, and Application Layers 24 Unit 3: IP Subnetting and Basic Router Configuration 34 Unit 4: IP Routing with Connected, Static, and RIP-2 Routes 44 Unit 5: IP Troubleshooting and EIGRP 53 Unit 6: Subnet Design 62 Unit 7: Advanced IP Routing Topics and OSPF 69 Unit 8: Advanced IP Topics 79 Unit 9: LANs 88 Unit 10: WANs 98 Unit 11: Course Review and Final Examination 107 COURSE SUPPORT...

Words: 22068 - Pages: 89

Free Essay

Customerservice Representative

... MARRIAGE: MARRED NATIONALITY: KENYAN CONTACTS : TEL. 0720-281406 / 0723270509 Email caro2006beta@yahoo.com CAREER OBJECTIVE  Work towards archiving the best in my field, to improve the quality of production by working out for the reliable and effective means of production facility at an appropriate cost.  Acquire knowledge in computer and networking engineering through research and application of the discovered. PROFESSIONAL BACKGROUND KENYA COLLEGE OF ACCOUNTANCY Jan - July 2006 Diploma 1 International Management Information System (IMIS)...

Words: 504 - Pages: 3

Premium Essay

System Admin

...system administrator? * A system administrator (SA) is responsible for managing and maintaining a multiuser computing environment. * He /she looks after computers, networks, and the people who use them. * May look after hardware, operating systems, software, configurations, applications, or security. * A system administrator influences how effectively other people can or do use their computers and networks. SA responsibilities include: * Installing, maintaining and troubleshooting workstations, servers, OSs, software applications and other computing systems * Creating user accounts and assigning user permissions * Executing anti-virus mechanisms * Creating backup * Creating file systems * Monitoring network communication * Updating systems upon release of new OSs or software * Implementing computer, network and security policies for system and network users. * Light programming or scripting * User training and management * Hardware and software system security, such as protection against hardware theft and abuse, malware/spyware and unauthorized use of systems and components, including firewall and intrusion detection system maintenance (http://www.techopedia.com/definition/4815/system-administrator-sa Book:the practice of system and network administration second adition by:Tomas A,limoncile) Consequences of not doing your work as system administrator * There will be number of loss from the organization...

Words: 507 - Pages: 3

Free Essay

Network Plus

...CompTIA Network+ Practice Question Answers Question 1. Objective: Given a scenario, install and configure routers and switches. The IEEE standard 802.3af states the specifications for which of the following? a) Quality of Service b) VLANs c) Routing tables d) Power over Ethernet Question 2. Objective: Given a scenario, troubleshoot common router and switch problems. A user's remote marketing server has changed IP address schemes and now the user can no longer access it. The user further discovers that the distant end still has access to them. Which of the following is a possible cause? a) SNMP strings need to be added b) Firewall rules need to be configured c) Port bonding on the interface needs to be enabled d) The switch has lost power Question 3. Objective: Explain the purpose and features of various network appliances. Which of the following is a network device that allows remote users access to a network? a) DNS server b) Content filter c) Load balancer d) VPN concentrator Question 4. Objective: Given a scenario, use the appropriate network monitoring resource to analyze traffic. A technician suspects that a virus has been introduced on the network. Which network resource is BEST used to confirm this problem? a) Syslog b) SNMP c) Network sniffer d) Environmental monitor Question 5. Objective: Given a scenario, implement the following network troubleshooting methodology. A user reports a network connectivity problem. Which...

Words: 1379 - Pages: 6

Premium Essay

Names

...running performance analysis software program. * Determines value of depreciable assets by running depreciation software program. * Protects organization's value by keeping information confidential. * Updates job knowledge by participating in educational opportunities. * Accomplishes accounting and organization mission by completing related results as needed. Skills/Qualifications: Organization, Financial Software, Reporting Skills, Attention to Detail, PC Proficiency, Typing, Productivity, Dependability 2. Admissions Director – Hospital Job Purpose: Admits patients by directing the admissions process; developing, implementing and maintaining revenue-generating strategies; determining and implementing admissions best-practices; promoting the hospital; maintaining a satisfied patient base. Admissions Director - Hospital Job Duties: * Accomplishes admissions human resource strategies by determining accountabilities; communicating and enforcing values, policies, and procedures; implementing recruitment, selection, orientation, training, coaching, counseling, disciplinary, and communication programs; planning, monitoring, appraising, and reviewing job contributions; planning and reviewing compensation strategies. * Develops admissions...

Words: 1486 - Pages: 6

Premium Essay

Rizal

...City, La Union, Philippines (April 2006) WORK HISTORY * More than five (8) years of extensive working experience in BPO industry involving Customer service skills. Developing and maintaining a productive relationship and interaction with all callers, while providing personalized, and consultative education and information. EMPLOYMENT HISTORY PERIOD COMPANY/PROJECT/POSITION/JOB DESCRIPTION MAY 25, 2015 Telstra powered by TeleTech to Present Five E-Com Center, Mall of Asia Complex, Pasay City. Technical Support Representative (TELSTRA /BIGPOND account) * Provides technical and network problem resolution to end-users (customers) by performing a question diagnosis while guiding users through step-by-step solutions, assisting with navigating around application menus and troubleshooting email issues. * uninstalling/reinstalling basic software applications, verifying proper hardware and software set up, power cycling equipment, * Interact with customers to provide and process information in response to inquiries, concerns, and requests about products and services; * Gather customer’s information and determine the issue by evaluating and analyzing the symptoms; * Research required information using available resources; * Follow standard processes...

Words: 696 - Pages: 3

Premium Essay

Microcontroller

...Dell™ OptiPlex™ FX160/160 Service Manual  Working on Your Computer System Setup Selective USB Reinstalling Software Troubleshooting Computer Stand Covers Hard Drive Assembly (Optional) NVRAM Module Wireless Card I/O Board Power Supply Processor Heatsink Assembly Memory Coin-Cell Battery Cable Guide Antenna System Board Assembly Getting Help Finding Information  Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. If you purchased a Dell™ n Series computer, any references in this document to Microsoft® Windows® operating systems are not applicable. Information in this document is subject to change without notice. © 2008 Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, and OptiPlex are trademarks of Dell Inc.; Intel is registered trademarks of Intel Corporation in the U.S. and other countries; Microsoft, Windows, Windows Vista, the Windows Start button, and Outlook are registered trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the...

Words: 18309 - Pages: 74