Identify Network Problem Edited
Identify Network Problem Edited
LEARNING GUIDE # 1
Unit of Competence: Identify and Resolve Network Problems
Module Title: Identifying and Resolving Network Problems
.
1 Structured Network Troubleshooting
1.1 Troubleshooting Overview
Dependency on network resources has grown tremendously over the past ten years. In today’s
world, a company’s success is highly dependent on its network availability. As a result,
companies are increasingly less tolerant of network failures. Therefore, network troubleshooting
has become a crucial element to many organizations.
Not only has the dependency for network grown, but the industry also is moving toward
increasingly complex environments, involving multiple media types, multiple protocols, and
often interconnection to unknown networks. These unknown networks may be defined as a
transit network belonging to a Internet service provider (ISP). The convergence of voice and
video into data networks has also added to the complexity and the importance of network
reliability.
More complex network environments mean that the potential for connectivity and performance
problems in internetworks is high, and the source of problems is often elusive.
1.2 General Problem-Solving Model
When you’re troubleshooting a network environment, a systematic approach works best. An
Unsystematic approach to troubleshooting can result in wasting valuable time and resources, and
can sometimes make symptoms even worse. Define the specific symptoms, identify all potential
problems that could be causing the symptoms, and then systematically eliminate each potential
problem (from most likely to least likely) until the symptoms disappear.
The following steps detail the problem-solving process outlined here:
Step 1. when analyzing a network problem, make a clear problem statement. You should define
the problem in terms of a set of symptoms and potential causes.
To properly analyze the problem, identify the general symptoms and then ascertain what kinds of
problems (causes) could result in these symptoms. For example, hosts might not be responding to
service requests from clients (a symptom). Possible causes might include a misconfigured host,
bad interface cards, or missing router configuration commands.
Step 2. Gather the facts that you need to help isolate possible causes.
Ask questions of affected users, network administrators, managers, and other key people. Collect
information from sources such as network management systems, protocol analyzer traces, output
from router diagnostic commands, or software release notes.
Step 3. Consider possible problems based on the facts that you gathered. Using the facts, you
can eliminate some of the potential problems from your list.
Depending on the data, for example, you might be able to eliminate hardware as a problem so
that you can focus on software problems. At every opportunity, try to narrow the number of
potential problems so that you can create an efficient plan of action.
Step 4. Create an action plan based on the remaining potential problems. Begin with the most
likely problem, and devise a plan in which only one variable is manipulated.
Some of the important things you should consider as potential candidates for documenting
include the following:
A logical map of the network. This may or may not match up with the physical way the
network is laid out.
A physical map of the network. This documentation should describe each physical
component and illustrate the ways in which the different components are connected.
Cabling and patch panel information. When you've got hundreds of cables in a wiring
closet patching together different physical segments, you'll need to know which cable
connects this to that.
Default settings for computers and other devices on the network. A spreadsheet is good
for this. An application that manages servers, network components, and client computers
is even better.
A logical map of the network shows the relationships between components and the flow
of information through the network. A physical map of the network tries to approximate
on paper a representation of how each component of the network is connected to the
network. For example, a logical map for a Windows network might show computers
grouped by domains, even though the computers are not located physically in the same
part of the network.
A physical map would show the location of each of the computers, the hub or switch to
which they are connected, and so on. In general, logical maps can be used to help isolate
configuration or application problems, whereas physical maps can be used to isolate a
problem that affects only a portion of the network, perhaps a single computer or other
device.
In any troubleshooting procedure a series of tests narrows down the possible causes of a
problem. The following procedure can be used as a guideline — each organization will
have their own procedures to suit their computing environment.
Table 1: When the user cannot access a peripheral on the network — typical techniques
for troubleshooting
Item Commands
Check that the network cables are securely in place at the
back of the computer.
Check that cables to hubs, switches, bridges and routers are
fixed securely in their sockets.
Check the network Use the commands
configuration on workstations ‘ipconfig/all’ and
involved, to ensure that they ‘ping’.
are correct.
Check that you can access Use the commands
other computers and ‘ping’ or ‘tracert’ if
peripherals on the network. part of your
network is on the
other side of a
router.
Check the permissions to ensure that the user has the right
levels of access network resources.
Check that an individual user is in the correct group that
has access to network resources
Check and replace the network cards and drivers, as
required.
Check the configurations of Use the command
the default gateway and ‘ipconfig/all’ for
browser proxy server setting. the default
gateway, and
‘Tools’, ‘Internet
Options’ in the
browser to check
proxy settings.
This section describes how to troubleshoot Layer 1 and 2 physical connectivity issues on LANs
such as Ethernet or Token Ring. Problems can generally be found more quickly by first
troubleshooting at Layer 3 and then working backward when a physical problem is found or
suspected. Possible problems include these:
• Configuration is incorrect.
Cable Problem: Cables that connect different parts of a network can be cut or shorted. A short can
happen when the wire conductor comes in contact with another conductive surface, changing the path
of the signal. Cable testers can be used to test for many types of cable problems such as:
Cut cable, incorrect cable connections, Cable shorts, Interference level, Connector Problem
Testing Cables
Cable length— The physical network topology restricts the length of certain segments in
the network. If you make your own cables, a common error may result from trying to
stretch the limits of the topology and create a cable that's just a few meters too long. If a
desktop is just a few meters farther from a switch than the standard allows, you may get
complaints from that user!
Resistance— Electricity encounters resistance as it travels along a copper wire.
Noise— Interference can come from other cables that are bundled together or from
outside sources, such as fluorescent lighting, nearby welding, strong sources of
electromagnetic frequencies, and other high-voltage electrical sources located near the
network cabling.
Attenuation— As the cable encounters resistance traveling down the wire, and as part of
the signal radiates out of the wire, the signal weakens. This is a normal side effect of
using copper wiring instead of fiber optics. You can expect copper wiring to work best at
the standardized lengths, and take your chances at extending that length.
Near-end cross-talk (NEXT)— From the transmission end of a cable, it is necessary to
remove the surrounding material that encloses the copper wires and attach each wire to a
pin in the cable connector. Because the strength of signal is strongest at the end of the
cable where the electrical signal is generated, there is a greater potential for interference
between the wires at this end of the cable.
Identify and Resolve Network Problems Page 7
Department of Information Technology
Ethiopian TVET System
Training, Teaching and Learning Material Entoto TVET College
Check to make sure that all cables are connected to the appropriate ports. Make sure that
all cross-connects are properly patched to the correct location using the appropriate cable
and method.
Verify that all switch or hub ports are set in the correct VLAN or collision domain and
have appropriate options set for spanning tree and other considerations.
Check the Configuration: Verify that the interface on the device is configured properly and is not shut
down. If the device is connected to a hub or switch, verify that the port on the hub or switch is
configured properly and is not shut down. Check both speed and duplex.
Most interfaces or NICs will have indicator lights that show whether there is a valid connection; often
this light is called the link light. The interface may also have lights to indicate whether traffic is being
sent (TX) or received (RX). If the interface has indicator lights that do not show a valid connection,
power off the device and reseat the interface card.
2. Connectivity Problem: A connectivity problem with one or more devices in a network can occur after
a change is made in configuration or by a malfunction of a connectivity component, such as hub, a
router or a Switch.
This section describes how to troubleshoot local connectivity problems on LAN segments such as
Ethernet or Token Ring. Going through the methodology in this chapter with help determine and
resolve problems moving packets on the local LAN segment or to the next-hop router. Possible
problems include these:
• Configuration problem
• Duplicate IP address
To begin troubleshooting, display and examine the IP configuration of the source device. The method
to determine this information varies greatly from platform to platform. If you are unsure of how to
display this information, consult the manual for the device or operating system. Refer to the following
examples:
Examine the configuration, looking specifically for the IP address and subnet mask. On Windows 9x
or Windows 2000 platforms, the default gateway address should also be displayed.
If no IP address is configured, verify that this node receives its IP address from BOOTP or
DHCP. Otherwise, an IP address should be statically configured for this interface.
Configure an address if one is not present. If the source is configured to receive an IP address
via DHCP or BOOTP and is notreceiving one, make sure that the bootp (IP) helper address is
configured on the router interface facingthe source device.
If the incorrect IP address, subnet mask, or default gateway is configured, verify that this node
receives
its IP address from BOOTP or DHCP, and then contact the DHCP or BOOTP administrator. Ask
the
administrator to troubleshoot the DHCP or BOOTP server’s configuration. If the address is
statically
configured, configure the correct address.
3. Excessive Network Collisions: These often lead to slow connectivity. The problem can occur as a result
of bad network setup/plan, a user transferring a lot of information or jabbering network card.
NB: A jabbering Network card is a network card that is stuck in a transmit mode. This will be
evident because the transmit light will remain on constantly, indicating that the Network card is
always transmitting.
Software-Based Analyzers
Software analyzers are the cheapest route for large, complex networks. Because processors have
scaled to much greater speeds and network adapters can capture packets from the fastest LAN
speeds, software analyzers are now catching up to hardware-based analyzers. And you can find
Identify and Resolve Network Problems Page 9
Department of Information Technology
some freeware analyzer products on the Web that perform some or all of the functions you might
need in a small network.
Windows NT 4.0 through Windows 2003 servers come with a network monitor tool that enables
the local workstation or server to monitor network traffic that is generated by or sent to the
computer. The version that comes with the Systems Management Server (SMS) allows the
network administrator to monitor all traffic on the LAN, using a feature referred to as
promiscuous mode. The Windows 2000 Servers and Windows 2003 Servers network monitor
can be found in the Administrative Tools folder.
3. Software Problem: Network problems can often be traced to software configuration such as
DNS configuration, WINS configuration, the registry etc.
It is possible for IP connectivity to work but for DNS name resolution to fail. To troubleshoot this situation,
use one of the following methods to determine whether DNS is resolving the name of the destination:
• Ping the destination by name, and look for an error message indicating that the name could not be
resolved. Otherwise, continue troubleshooting as follows:
1. Determine which name server you are using; this can be found in different places on each operating
system, so if you are unsure of how to find it, consult the device’s manual
2. Verifythat you can ping the name server using its IP address. If the ping fails, go to the section to
troubleshoot connectivity between the client and the name server.
3. Verify that you can resolve names within your domain. (For example, if your host is Host1.test.com, you
should be able to resolve the names of other hosts in the test.com domain, such as host2.test.com.)
4. Verify that you can resolve one or more domain names outside your domain. If you cannot resolve names
from all domains except that of the destination, there might be a problem with the DNS for the
destination host. Contact the administrator of the destination device. If you cannot resolve names within
5. Duplicate IP Addressing: A common problem in many networking environments occurs when two
machines try to use the same IP address. This can result in intermittent communications.
IP Troubleshooting
1. Which one is the first step that you should do, when troubleshooting network problem?
A. Define the specific symptoms
B. Identify all potential problems
C. Systematically eliminate each potential problem
D. Analyze the results
2. What is the important things you should consider as potential candidates for documenting
network installation?
b. Ping D. all
5. Which one of the following can be described as network Physical Connectivity
Problems?
A. Incorrect Configuration C. faulty Hardware (interface or port)
B. Faulty or improper Cable D. Interface having too much traffic
E. All
6. Which one of the following should be tested, when testing network cable?
A. Cable length D. Near-end cross-talk
B. Noise E. all
C. Attenuation
7. Common problem in many networking environments occurs when two machines try to
use the same IP address.
A. False B. True
8. ------- shows the relationships between components and the flow of information through
the network?
A. Network overview
B. Physical map of the network
C. Logical map of the network
D. All
2. E
3. A
4. C
5. E
6. E
7. B
8. C
3. Click the Install button. In the Select Network Component Type dialog box, highlight Protocol
and click the Add button (Figure 2.2).
4. In the Select Network Protocol dialog box, select NetBEUI Protocol (Figure 2.3), and click the
OK button. You will be prompted to reboot the system to make the changes take effect.
(Figure 2.2)
(Figure 2.3)
NWLink (IPX/SPX)
As mentioned, NWLink is Microsoft’s implementation of the IPX/SPX protocol. The Microsoft
version of NWLink provides the same level of functionality as the Novell protocol and also
includes an element for resolving NetBIOS names. NWLink packages data to be compatible with
client/server services on NetWare networks, but it does not provide access to NetWare File
and Print Services. For this, you also need to install the Client Service for NetWare, as noted
earlier.
Follow the same steps used to install NetBEUI to install NWLink, except choose NWLink rather
than NetBEUI when you make your final selection. You’ll be prompted to reboot after adding
the protocol.
NWLink is a relatively easy protocol to configure. Normally, the only settings you may need to
specify are the internal network number and frame type (usually, however, the default values are
sufficient). The internal network number is used by the network for routing purposes.
The frame type specifies how the data is packaged for transport over the network. For computers
to communicate by NWLink, they must have the same frame types. By default, the
Frame type is set to Auto Detect.
To configure NWLink properties manually, follow these steps:
1. In Windows XP, click Start | Control Panel and open the Network
Connections applet. Double-click the Local Area Connection icon. In Windows xp, click Start |
Settings | Network and Dial-up Connections, and double-click the Local Area Connection icon.
2. Click the Properties button, highlight NWLink IPX/SPX/NetBIOS Compatible Transport
Protocol, and click the Properties button.
3. In the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol properties dialog box, set
the internal network number and frame type (Figure 2.4).
2.2 Existing sources of diagnostic information
Configuring Active Directory diagnostic event logging in Windows Server 2003
Active Directory records events to the Directory Services log of Event Viewer. You can use the
information that is collected in the log to help you diagnose and resolve possible problems or
monitor the activity of Active Directory-related events on your server.
By default, Active Directory records only critical events and error events in the Directory
Service log. To configure Active Directory to record other events, you must increase the logging
level by editing the registry.
21 Linked-Value Replication
22 DS RPC Client
23 DS RPC Server
24 DS Schema
Logging Levels
Each entry can be assigned a value from 0 through 5, and this value determines the level of detail
of the events that are logged. The logging levels are described as:
0 (None): Only critical events and error events are logged at this level. This is the default
setting for all entries, and it should be modified only if a problem occurs that you want to
investigate.
1 (Minimal): Very high-level events are recorded in the event log at this setting. Events
may include one message for each major task that is performed by the service. Use this
setting to start an investigation when you do not know the location of the problem.
2 (Basic)
3 (Extensive): This level records more detailed information than the lower levels, such as
steps that are performed to complete a task. Use this setting when you have narrowed the
problem to a service or a group of categories.
4 (Verbose)
5 (Internal:): This level logs all events, including debug strings and configuration
changes. A complete log of the service is recorded. Use this setting when you have traced
the problem to a particular category of a small set of categories.
Important This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly. Therefore, make
sure that you follow these steps carefully. For added protection, back up the registry before you
modify it. Then, you can restore the registry if a problem occurs. For more information about
how to back up and restore the registry, click the following article number to view the article in
the Microsoft Knowledge Base:
How to back up and restore the registry in Windows
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Diagnos
tics
Each entry that is displayed in the right pane of the Registry Editor window represents a
type of event that Active Directory can log. All entries are set to the default value of 0
(None).
Notes
Logging levels should be set to the default value of 0 (None) unless you are investigating
an issue.
When you increase the logging level, the detail of each message and the number of
messages that are written to the event log also increase. A diagnostic level of 3 or greater
is not recommended, because logging at these levels requires more system resources and
can degrade the performance of your server. Make sure that you reset the entries to 0
after you finish investigating the problem.
There are many possible causes of connection problems. This guide will show how you can
investigate problems using some simple tools that come with most versions of Windows. To use
all of the tools though, you will need Windows Vista or XP.
The tools in this guide can be accessed from the command prompt. While this can look a little
intimidating, it is simple to use with a little bit of know-how.
Connection Settings
This Module assumes that you have checked and confirmed that your connection settings are correct.
Does your PC have a network connection?
1. Click Start.
2. Click Settings.
3. Click Network Connections.
4. Check the status of your network connection. If your connection is broken, your
connection icon will show a small red cross.
If your connection is still broken, you need to check your network settings.
To use the network tools described in this article you need to open a command line window.
Command line looks like the old DOS environment, and is used through typed commands rather
than with a graphical interface. To open a command line:
1. Click Start.
2. Click Run (or press the r key).
3. Type "cmd" into the 'Run' window.
4. Click Return.
If you need to send results of your tests to the support team for further investigation, you can do
so by copying them from the command line window, into Notepad or another text editor.
To use Ping
3. You'll see how Ping turns the web address into the corresponding IP address (i.e.
"www.google.com" would be turned into 64.233.183.99).
Ping sends four packets and gives you an average for the time it takes for the ping to make it
round
Continuous Ping
Ping sends four packets of data, which isn't very good at showing problems that are intermittent.
A continuous Ping can be useful if you think there might be a problem with cables, as you can
see exactly when connection problems are occurring.
Response Explanation
Unable to resolve target Check your destination address.
system...
Trace complete... Trace route worked.
Request timed out... Destination not responding.
Destination network Indicates a network problem.
unreachable...* To use Continuous Ping
Is an enhanced form of ping that provides some of the information you would gain from using
the trace route tool. It is most useful for identifying where a connection problem is occurring.
1. In the command line window type "path ping [address]" for example "pathping
2. View the first set of results - which is a list of servers that your ping data travels through
to reach the destination address. Each server that is passed through on the route is known
as a 'hop'. You will see the message "Computing Statistics for 250 seconds..." Pathping is
now monitoring data through each of the servers, looking to see if any of them are
responding slowly, or intermittently. The longer the route to the destination, the more
Trace route shows you the route your data packets are taking to reach a destination system. Trace
route results can show:
*Destination network unreachable - this means that a device that the you are sending data to is
not responding, it my down, or there might be a network fault. This type of problem is usually
outside Plusnet's control.
IPCONFIG
Windows 2000/XP offer the command-line tool IPCONFIG for a quickglance at your network
settings. Click Start |Run and type CMD to get a command prompt. From the prompt, type
IPCONFIG /ALL to see all of your TCP/IP settings
DNS (Domain Name System) turns your user-friendly web addresses into the numerical IP
addresses that are used by computer systems. If you have a working connection, but can't view
popular websites like BBC or Google, then faulty DNS settings may be the cause.
The first thing you should do is remove the saved DNS information in your computer, this may
now be out of date.
DNS lookups You can test to see if your DNS is working properly by doing a DNS lookup,
using the command line tool nslookup.
To do a DNS Lookup
Netstat tells you what your computer is connected. This makes if useful for seeing if your
computer is connected to servers that you don't know about. If you think that your computer is
infected with "Spyware" or certain types of virus Netstat may help you find them out.
To run Netstat
Different programs and processes may connect to remote computers. In most cases there's
nothing to worry about. The two things to look for are the numbers after the colon (port
numbers), and the Foreign Addresses.
Ports are the doorways that different computer programs use to send data over a network. For
example, browser traffic uses Port 80, email uses ports 25 and port 110. If you are worried that
your system has been infected with a Trojan, or similar virus, you may be able to spot the
connection it uses. The port numbers that are associated with Spyware and Trojans are changing
all the time - its always best to make sure you have updated anti-virus and firewall software
running on your computer.
Foreign addresses are the systems that are connected to your computer that appear to be remote.
While it can be hard to know what to look for, one solution is to run netstat while no programs
are running and save the results to compare later.
Telnet is a program that allows you to access and use other computers remotely. It has lots of
uses for testing problems because it can let you manually test Internet services as if you were a
browser or email program. You can then see if a problem you have is due to the service or your
computer setup. You can use telnet to confirm that a service like email is accepting connections.
A telnet client is included with most versions of Windows, though in Windows Vista it has to be
added as follows:
Problem sending email - test you access to our mail relay server
3. You should see a response that begins "220" which indicates that you have successfully
connected to the mail relay server. If you don't get a response that beings with "220" then
either the relay server is not responding, or port 25 is being blocked.
Netshell is a tool that allows you to check that Windows is properly setup for networking. It can
test many different aspects of your network connection, depending on what you have got setup
on your system.
To use Netshell
Tracert command
The tracert command lists the number of hops needed to connect to a target computer. Each
hop represents a device that the packets of data must travel through in order to continue along the
network. On the Internet, this is a usually a router. When testing in a LAN environment, there is
usually just one hop.
A. Network Speed
10M, 100M, Gigabit? Who knows? Something that reports network speed is very useful. Link
testing can be used to identify the network speed. It’s useful to find out additional network
information using DHCP.
If you are running Gigabit on your network you need to ensure that your cabling is up to the
Cat5e standard, the older Cat5 standard is fine for 100M but needs careful checking if you intend
to run Gigabit. Many organizations only discover this too late.
B. Cable Length
The longer the cable the more the signal is reduced (attenuated), ultimately to the point where no
signal gets through. Measuring cable lengths to check that they are within specification is
important and remember that attenuation increases with network speed, so your new faster
network may have cable lengths that were fine on your old network, but are now too long.
C. Wire mapping
Are you sure that pin 1 is really connected to pin 1 at the other end? You need to check this to be
certain. What about short circuits, crossed wires, split pairs etc.? Most of these faults can be
detected using a continuity test, but some, like split pairs, require a signal to be sent down the
wire. Something that can send a signal or tone is required.
You can also use tone generators for signal tracing and cable identification.
D. Connectivity Testing
Ping tests confirm connectivity across the network, to PCs and Network Cards.
E. Voltage on the wire
Phantom voltages or electrical noise can cause faults on the network. It’s useful to be able to
check where voltage are occurring, either intentionally or not.
F. Conclusion
As a Network Manager you will be expected to deal with day to day cabling problems. You
probably can’t justify the cost of the specialist testers used by cabling professionals, but a simple
testing kit will allow you to check for the most common problems, save you time chasing
phantoms, and help you resolve issues faster and more efficiently.
refers to color-coded strands of wires that are matched together, and cable housing is the plastic
insulation that covers and protects these wires.
Instructions
1. Testing Using a Continuity Tester
1. Power on the continuity tester.
2. Insert one of the cable plugs into the tester and the other into the terminator.
3. Look at the display of the network tester. Depending on your continuity tester, at a
minimum it will indicate if there is a break in the cable and, should it include this
feature, which cable pairs the break affects.
2. Testing Continuity Without a Continuity Tester
1. Power the computer and a router or other networking device on.
2. Plug the cable into the network port on the computer and the other end into the
networking device.
3. Look at the back of the computer where the cable is plugged into the Ethernet jack
and see if any flashing green or yellow lights come on. These lights indicate if the
computer is sending or receiving any information. If the lights are lit or flashing, the
cable continuity is good. If not, replace the cable.
4. Resolving NIC Problem
The Ethernet Adaptor or the Network Interface card (NIC) is the piece of hardware that makes it
possible to access the internet. The Network Interface card is also essential for PC-to-PC
communication and other forms of computer interactions that involve two or more devices such
as Bluetooth and Infrared. Frankly, two computer systems can only share a file with each other
because they have a network Interface Card that enables them to communicate with each other --
sending and receiving signals. If a device must communicate with another device, it needs a NIC.
Your broadband modem and printer use the NIC technology.
Unplug and replug the network connector into the NIC and at the other end.
Check that the other end of the cable is connected to a device that is powered on.
Try switching the cable to a different port if available.
Try a different network cable.
Check the control panel in Windows to make sure the card is recognized and working.
Check that the far end of the network cable is connected to the proper port, or try a
different port.
Check that your PC is not using an IP address that is already in use on your network.
Make certain that your PC is not using a name that is already in use by another PC on the
network.
The lights on the NIC are normal but I cannot connect to the network
Self check
1. One of the following may not needed to have broad band network connectivity?
A. Modem card
B. NIC
C. Protocol
D. Network client
2. Ping results may not tell you------?
5. Which of the following PING response show correct response of network destination?
A. Ping request could not find host...
B. Reply from...
C. Request timed out...
D. All
6. Which of the following Trace route Responses show correct response of network
destination?
A. Ping
B. Tracert
C. Nslookup
D. IP Config
Feedback
1. A
2. D
3. B
4. C
5. B
6. B
7. C
5. Network Protocols
In Networking "protocol" usually refers to a set of rules that define an exact format for
communication between systems. For example the HTTP protocol defines the format for
communication between web browsers and web servers, the IMAP protocol defines the
format for communication between IMAP email servers and clients, and the SSL protocol
defines a format for encrypted communications over the Internet.
Introduction
In the mid-1990's, the Internet is a dramatically different network than when it was first established in the
early 1980's. Today, the Internet has entered the public consciousness as the world's largest public data
network, doubling in size every nine months. This is reflected in the tremendous popularity of the World
Wide Web (WWW), the opportunities that businesses see in reaching customers from virtual storefronts,
and the emergence of new types and methods of doing business. It is clear that expanding business and
social awareness will continue to increase public demand for access to resources on the Internet.
There is a direct relationship between the value of the Internet and the number of sites connected to the
Internet. As the Internet grows, the value of each site's connection to the Internet increases because it
provides the organization with access to an ever expanding user/customer population.
An IP address is a logical address of a computer which is expressed as a four 8-bit group of bits (a total of
32 bits) separated by periods. Each 8-bit group of bits can be represented by a 3-digit decimal that spans
between 0 and 255. For example 196.27.22.42 is a typical IP address of the DNS server of the Ethiopian
Telecommunication Corporation (ETC). The total number of distinct addresses one can have from these
32
32 bit addressing scheme is 2 = 4,294,967,296.
IP Addressing Class
When IP was first standardized in September 1981, the specification required that each system attached to
an IP-based internet be assigned a unique, 32-bit Internet address value. Some systems, such as routers
which have interfaces to more than one network, must be assigned a unique IP address for each network
interface.
The first part of an Internet address identifies the network on which the host resides, while the second part
identifies the particular host on the given network. This created the two-level addressing hierarchy which
is illustrated in Figure 3.
One of the fundamental features of classful IP addressing is that each address contains a self-encoding
key that identifies the dividing point between the network-prefix and the host-number. For example, if the
first two bits of an IP address are 1-0, the dividing point falls between the 15th and 16th bits. This
simplified the routing system during the early years of the Internet because the original routing protocols
did not supply a "deciphering key" or "mask" with each route to identify the length of the network-prefix.
Each Class A network address has an 8-bit network-prefix with the highest order bit set to 0 and a seven-
bit network number, followed by a 24-bit host-number. Today, it is no longer considered 'modern' to refer
to a Class A network. Class A networks are now referred to as "/8s" (pronounced "slash eight" or just
"eights") since they have an 8-bit network-prefix.
7
A maximum of 126 (2 -2) /8 networks can be defined. The calculation requires that the 2 is subtracted
because the /8 network 0.0.0.0 is reserved for use as the default route and the /8 network 127.0.0.0 (also
written 127/8 or 127.0.0.0/8) has been reserved for the "loopback" function. Each /8 supports a maximum
24
of 16,777,214 (2 -2) hosts per network. The host calculation requires that 2 is subtracted because the all-
0s ("this network") and all-1s ("broadcast") host-numbers may not be assigned to individual hosts. Since
31
the /8 address block contains 2 (2,147,483,648 ) individual addresses and the IPv4 address space
32
contains a maximum of 2 (4,294,967,296) addresses, the /8 address space is 50% of the total IPv4
unicast address space.
Each Class B network address has a 16-bit network-prefix with the two highest order bits set to 1-0 and a
14-bit network number, followed by a 16-bit host-number. Class B networks are now referred to as"/16s"
14
since they have a 16-bit network-prefix. A maximum of 16,384 (2 ) /16 networks can be defined with up
16 30
to 65,534 (2 -2) hosts per network. Since the entire /16 address block contains 2 (1,073,741,824)
addresses, it represents 25% of the total IPv4 unicast address space.
Each Class C network address has a 24-bit network-prefix with the three highest order bits set to 1-1-0
and a 21-bit network number, followed by an 8-bit host-number. Class C networks are now referred to as
21
"/24s" since they have a 24-bit network-prefix. A maximum of 2,097,152 (2 ) /24 networks can be
8 29
defined with up to 254 (2 -2) hosts per network. Since the entire /24 address block contains 2
(536,870,912) addresses, it represents 12.5% (or 1/8th) of the total IPv4 unicast address space.
Other Classes
In addition to the three most popular classes, there are two additional classes. Class D addresses have
their leading four-bits set to 1-1-1-0 and are used to support IP Multicasting. Class E addresses have their
leading four-bits set to 1-1-1-1 and are reserved for experimental use.
Dotted-Decimal Notation
To make Internet addresses easier for human users to read and write, IP addresses are often expressed as
four decimal numbers, each separated by a dot. This format is called "dotted-decimal notation."
Dotted-decimal notation divides the 32-bit Internet address into four 8-bit (byte) fields and specifies the
value of each field independently as a decimal number with the fields separated by dots. Figure 5 shows
how a typical /16 (Class B) Internet address can be expressed in dotted decimal notation.
Table 1 displays the range of dotted-decimal values that can be assigned to each of the three principle
address classes. The "xxx" represents the host-number field of the address which is assigned by the local
network administrator.
The original designers never envisioned that the Internet would grow into what it has become today.
Many of the problems that the Internet is facing today can be traced back to the early decisions that were
made during its formative years.
- During the early days of the Internet, the seemingly unlimited address space allowed IP addresses
to be allocated to an organization based on its request rather than its actual need. As a result,
addresses were freely assigned to those who asked for them without concerns about the eventual
depletion of the IP address space.
- The classful A, B, and C octet boundaries were easy to understand and implement, but they did
not foster the efficient allocation of a finite address space. Problems resulted from the lack of a
network class that was designed to support mediumsized organizations. A /24, which supports
254 hosts, is too small while a /16, which supports 65,534 hosts, is too large. In the past, the
Internet has assigned sites with several hundred hosts a single /16 address instead of a couple of
/24s addresses. Unfortunately, this has resulted in a premature depletion of the /16 network
address space. The only readily available addresses for medium-size organizations are /24s which
have the potentially negative impact of increasing the size of the global Internet's routing table.
The subsequent history of Internet addressing is focused on a series of steps that overcome these
addressing issues and have supported the growth of the global Internet.
For example, using our test IP address and the default Class B subnet mask, we get:
--------------------------------------------------------
Example:
10001100.10110011.11011100.11001000 140.179.220.200 IP Address
11111111.11111111.11100000.00000000 255.255.224.000 Subnet Mask
--------------------------------------------------------
10001100.10110011.11000000.00000000 140.179.192.000 Subnet Address
10001100.10110011.11011111.11111111 140.179.223.255 Broadcast Address
In this example a 3 bit subnet mask was used. There are 6 subnets available with this size mask(remember
hat subnets with all 0's and all 1's are not allowed). Each subnet has 8190 nodes. Each subnet can have
nodes assigned to any address between the Subnet address and the Broadcast address. This gives a total of
49,140 nodes for the entire class B address subnetted this way. Notice that this is less than the 65,534
nodes an unsubnetted class B address would have. Subnetting always reduces the number of possible
nodes for a given network. There are complete subnet tables available here for Class A, Class B and Class
C. These tables list all the possible subnet masks for each class, along with calculations of the number of
networks, nodes and total hosts for each subnet.
An Example
Here is another, more detailed, example. Say you are assigned a Class C network number of
200.133.175.0 (apologies to anyone who may actually own this domain address :). You want to utilize
this network across multiple small groups within an organization. You can do this by subnetting that
network with a subnet address. We will break this network into 14 subnets of 14 nodes each. This will limit us to
196 nodes on the network instead of the 254 we would have without subnetting, but gives us the advantages of
traffic isolation and security. To accomplish this, we need to use a subnet mask 4 bits long.
On home or small business networks with a broadband router to share the Internet
connection, the home router serves as the default gateway.
On home or small business networks without a router, such as for residences with dialup
Internet access, a router at the Internet Service Provider location serves as the default
gateway.
Default network gateways can also be configured using an ordinary computer instead of a router.
These gateways use two network adapters, one connected to the local subnet and one to the
outside network. Either routers or gateway computers can be used to network local subnets such
as those in larger businesses.
6. Network Protocols Analysis
6.1 What is Network Protocol Analysis and Protocol Analyzer?
Network protocol analysis is a process for a program or a device to decode network protocol
headers and trailers to understand the data and information inside the packet encapsulated by the
protocol. To conduct protocol analysis, packets must be captured at real time for line speed
analysis or later analysis. Such program or device is called a Protocol Analyzer.
Protocol Analyzer can be used both for legitimate network management or for stealing
information off a network. Network operations and maintenance personnel use Protocol
Analyzer to monitor network traffic, analyze packets, watch network resource utilization,
conduct forensic analysis of network security breaches and troubleshoot network problems.
There are many protocol analyzer products on the market. The market size for this tool is nearly
one billion dollars. There are two basic types of protocol analyzers: portable and distributed.
Portable protocol analyzer is a stand-alone device or software installed in a PC. Portable protocol
analyzer can do data capturing and analysis real time or play back data for later analysis. The
price of a portable protocol analyzer is ranged from a few hundred dollars to tens of thousands
dollars, depends on who is the vendor, the network type (Ethernet, Gigabit Ethernet, Optical
media WAN links etc.) to monitor and the types of data analysis are done. Portable protocol
analyzer is typically used by engineers for network troubleshooting at certain point of a network
or to monitor traffic of a single domain of LAN.
Distributed protocol analyzers have two parts: 1) Monitoring Probe, a device deployed at various
point of the network; 2) Consol, a software package installed in the Network Operation Center
(NOC) to centrally monitor all Probes. The Distributed protocol analyzers are typically deployed
by large enterprises to monitor their network from a centralized location such as NOC. The cost
of deploy the Distributed analyzer is ranged from tens of thousands of dollars to millions of
dollars. In addition to packet capturing and analysis, the distributed analyzer also retrieves and
uses SNMP and RMON data for additional network statistical information.
The leading vendors in the portable protocol analyzer include: Network General, Agilent
Technologies, and Javvin Technologies etc.
The leading vendors in the distributed protocol analyzer include Network General, Netscout etc.
There are also open source programs such as Ethereal available for public usage.
Network protocol analyzer is also called network sniffer , Packet Analyzer, Network Sniffing
Tool, Network Analyzer etc.
TCP/IP is responsible for a wide range of activity: it must interface with hardware, route data to
appropriate places, provide error control, and much more. If you are starting to think the TCP/IP
suite can get confusing, you wouldn’t be the first.
The developers of TCP/IP thankfully designed what we call a modular design- meaning that the
TCP/IP system can be divided into separate components. You may call these layers or modules.
But why use a modular design? Not only does it aid in the education process, but it also lets
manufacturers easily adapt to specific hardware and operating system needs.
For example- if we had a token ring network and an extended star network, we surely wouldn’t
want to create entirely different network software builds for each one. Instead, we can just edit
the network layer, called the Network Access Layer, to allow compatibility. Not only does this
benefit manufacturers, but it greatly aids networking students in education. We can dissect the
TCP/IP suite into different layers, and then learn about each layer’s specifics one at a time.
Below you’ll see the TCP/IP model divided into four layers.
Network Access Layer – The Network Access Layer is fairly self explanatory- it
interfaces with the physical network. It formats data and addresses data for subnets, based
on physical hardware addresses. More importantly, it provides error control for data
delivered on the physical network.
Internet Layer – The Internet Layer provides logical addressing. More specifically, the
internet layer relates physical addresses from the network access layer to logical
addresses. This can be an IP address, for instance. This is vital for passing along
information to subnets that aren’t on the same network as other parts of the network. This
layer also provides routing that may reduce traffic, and supports delivery across an
internetwork. (An internetwork is simply a greater network of LANs, perhaps a large
company or organization.)
Transport Layer – The Transport Layer provides flow control, error control, and serves
as an interface for network applications. An example of the transport layer would be
TCP- a protocol suite that is connection-oriented. We may also use UDP- a
connectionless means of transporting data.
Application Layer – Lastly, we have the Application Layer. We use this layer for
troubleshooting, file transfer, internet activities, and a slew of other activities. This layer
interacts with many types of applications, such as a database manager, email program, or
Telnet.
The above layers are more complex than the general descriptions provided, but rest
assured, we will get into the specifics in later sections. For now we have another model to
learn- the OSI model.
Instead of four layers, the OSI model has seven. You can see a direct comparison of the two
models below; notice that only the Application Layer and Network Layer are divided into
smaller layers, and the Internet Layer is renamed to the “Network Layer.”
Physical Layer – They Physical Layer converts data into streams of electric or analog
pulses- commonly referred to as “1’s and 0’s.” Data is broke down into simple electric
pulses, and rebuilt at the receiving end.
Data Link Layer – The Data Link layer provides an interface with the network adapter,
and can also perform basic error checking. It also maintains logical links for subnets, so
that subnets can communicate with other parts of the network without problem.
Network Layer – Much like the Transport Layer of the TCP/IP model, the Network
Layer simply supports logical addressing and routing. The IP protocol operates on the
Network Layer.
Transport Layer – Since we left out the error and flow control in the Network Layer, we
introduce it into the Transport Layer. The Transport Layer is responsible for keeping a
reliable end-to-end connection for the network.
Session Layer – The Session Layer establishes sessions between applications on a
network. This may be useful for network monitoring, using a login system, and reporting.
The Session Layer is actually not used a great deal over networks, although it does still
serve good use in streaming video and audio, or web conferencing.
Presentation Layer – The Presentation Layer translates data into a standard format,
while also being able to provide encryption and data compression. Encryption or data
compression does not have to be done at the Presentation Layer, although it is commonly
performed in this layer.
Application Layer – The Application Layer provides a network interface for
applications and supports network applications. This is where many protocols such as
FTP, SMTP, POP3, and many others operate. Telnet can be used at this layer to send a
ping request- if it is successful, it means that each layer of the OSI model should be
functioning properly.
7. Analysing Server and Client performance
7.1. What Factors that affect performance of a network?
The data path between any two computers involves dozens, sometimes thousands, of hardware
and software devices. Any one of these may have a substantial impact on performance.
At any given time there is likely to be one factor which most directly limits the maximum speed
of a data flow. Identifying the limiting factor for each data flow is vital to improving
performance. Common factors are listed below:
Conclusion
The effects of software vary widely. Speed increases come from quashed bugs that hindered
network adapter performance or improvements to the network translation.
Factor Four: Motherboard Speed
Like your skeleton, a Mac's motherboard defines what it's capable of. The motherboard's
processing speed has inherent limits that include (to a degree) network performance. Newer
Macs have faster motherboard speeds, which in turn help network speed (or at least hinder it
less).
Conclusion
A faster motherboard generally means faster everything, including network performance.
Upgrading the motherboard, however, means getting a new Mac.
You can improve your disk performance by using a faster disk, which makes more information
available, and a more efficient disk interface, which processes more information at once.
Generally, newer hard drives are faster, up to 10K RPM and more. Interfaces, including SCSI,
IDE, and FibreChannel, have become more efficient with time. New Macs use IDE for their
built-in hard disks, but you can add other support with an expansion card. Get a high-speed disk
interface with a high-speed drive and you're almost certain to notice the change on your network
(and everywhere else).
Conclusion
Upgrading your disk drive and interface will almost certainly increase network performance,
although the performance increase will be relative to what you used previously.
Using AppleShare IP will improve network throughput notably, but regrettably does the same to
your wallet.
Conclusion
AppleTalk is (somewhat) slower than other options, but makes up for it in convenience.
Conclusion
Sharing an Internet connection has its own speed limitations that are out of the home network
user's control.
7.2 Network Bottleneck
What does Network Bottleneck mean?
A network bottleneck refers to a discrete condition in which data flow is limited by computer or
network resources. The flow of data is controlled according to the bandwidth of various system
resources. If the system working on a network is delivering a higher volume of data than what is
supported by the existing capacity of the network, then a network bottleneck will occur.
problems. This will cause the slowness. You can check to determine what is causing your
particular network bottleneck in a few steps.
Instructions:
1 Right-click an empty spot on your system tray -- usually at the bottom of your computer screen
-- and select "Task Manager."
2 Click the "Networking" tab.
3 Click "View" in the options above the tabs and click "Select Columns."
4 Click to check "Bytes Sent/Interval" and "Bytes Received/Interval." Click "OK."
8. Proactive Network Maintenance
8.1. Proactive Network Maintenance
- Common preventive maintenance techniques should continually be performed for a network to
operate properly.
- Heat is a big problem for network devices, especially in the server room. Network devices, such
as computers, hubs, and switches, do not perform well when over-heated. Excess heat is
generated by dust and dirty air filters. Dust impedes the proper flow of cool air and sometimes
even clogs fans. Keep network rooms clean and change air filters often.
- Preventive maintenance involves checking the various components of a network for wear. Check
the condition of network cables because they are often moved, unplugged, and kicked. Many
network problems can be traced to a faulty cable. You should replace any cables that have
exposed wires, are badly twisted, or are bent.
- Label the cables. This practice will save troubleshooting time later. Refer to wiring diagrams and
always follow your company's cable labeling guidelines.
- Test devices on a regular basis.
- AC power adapters should be checked regularly.
- The uninterruptible power supply (UPS), which provides backup power, should be tested to
ensure that you have power in the case of an outage. Before installing a new UPS, plug it into a
power source to charge the batteries. The initial charge time is usually 12 hours or more. Follow
the manufacturer instructions for unpacking the UPS and preparing it for use.
Preventive maintenance allows us to monitor your computers and network hardware and software to
help prevent problems or errors that may cause loss of important data or loss of business.
• Reboot - A quick solution that seems to work in many situations is a simple reboot of the
network device. A simple reboot will clear the contents of RAM and give the device a clean
start. If the problem goes away after a reboot, then it was probably a software problem. If the
problem occurs again, it is probably a hardware problem such as a malfunctioning RAM
chip.
• Contact the ISP/Network Administrator - If all of the equipment that the customer has is
working properly, but there is still no connection to the Internet, contact the customer's ISP or the
network administrator. It is not always possible to solve the problem with a quick solution. To
proceed troubleshooting the problem, you will need to gather information from the computer.
4. Gather Data from the Computer
The next step is to inspect the computer. Data gathered from the computer can be used to
confirm the data obtained from the customer. The data can be used to provide additional insight and
direction. There are several software tools available that a technician can use to test the network.
Each of these utilities will provide information that can help narrow down the possible problems on
the network:
• Ping is used to check network connectivity. It sends a packet to the specified address and
waits for a reply.
• Nslookup: is used to query Internet domain name server. It returns a list of hosts in a
domain or the information for one host.
• Tracert : is used to determine the route taken by packets when they travel across the
network. It shows where communications between your computer and another computer are
having difficulty.
• Net View is used to display a list of computers in a workgroup. It shows the available shared
resources on a network.
5. Evaluate Problem & Implement Solution: If the network problem still exists after quick solutions have
been implemented, you must complete additional research to identify other possible solutions. You
should prioritize the possible solutions from the easiest to implement to the most difficult to
implement.
• Evaluate each solution and implement it individually. If a proposed solution doesn't
correct the problem, reset the computer back to the original state and try another
proposed solution. If you make two or more changes without solving the problem, you
may make it more difficult to solve.
6. Close with the Customer: After repairs to the network have been completed, complete the work order
and close with the customer.
• If possible, verify the network solution with the customer.
• Demonstrate how the repairs have fixed the problem. Have your customer test the solution.
• Complete the work order and submit documentation for invoicing.
Include the steps done, the solution, and the time needed for the repair in your final documentation.
This documentation should be maintained by the customer in case this problem happens again.
Record everything that took place in your own notes. Information from each repair is very useful for
future troubleshooting.
Troubleshoot a network
- Network issues can be simple or complex. To assess how complicated the problem is,
you should determine how many computers on the network are experiencing the problem.
- If there is a problem with one computer on the network, start the troubleshooting process
at that computer.
- If there is a problem with all computers on the network, start the troubleshooting process
in the network room where all computers are connected.
- As a technician, you should develop a logical and consistent method for diagnosing
network problems by eliminating one problem at a time.
- After completing this section, the students will meet these objectives
- Review the troubleshooting process.
- Identify common network problems and solutions.
Configuration Identification
Configuration identification (CI) involves identifying the components of the network, uniquely
identifying the individual components, and making them accessible in some form. A proper
configuration identification schema identifies each component of the network and provides
traceability between the component and its configuration status information. Proper
configuration identification answers the following questions:
What is the configuration of the network?
What are the components of the network?
What are the versions of the network components?
Definition
A disaster is defined as a sudden misfortune that is ruinous to an undertaking. This means that
there is little time to react at the time of the misfortune. Preparations have to have been made in
advance. The focus should, therefore, be on disaster planning.
What Is Disaster Recovery?
In IT, disaster recovery involves a series of actions to be taken in the event of major unplanned
outages to minimize their adverse effects. Disasters can result from events such as
hacker attacks
computer viruses
electric power failures
underground cable cuts or failures
fire, flood, earthquake, and other natural disasters at a facility
mistakes in system administration
The terrorist attacks of 11 September, for example, caused large-scale network outages. Among
the affected systems were some of the fiber optic telecommunications services provided by
Verizon. Besides the financial impact to Wall Street firms from lost data connectivity, the loss of
voice contact with friends and family greatly affected many individuals on that day.
All good IT disaster recovery plans consider the three main components of operations:
data
systems
people
From the technical perspective, most organizations rely on some form of redundancy to make
possible the recovery of data and systems. Redundancy allows secondary data or system
resources to be pressed into service on short notice should primary resources fail or otherwise
become unavailable.
Traditional backup strategies, for example, archive copies of critical data at a given point in time
so that they can be restored later if needed. Organizations may also choose to replicate servers
and other critical hardware at multiple locations to guard against any single point of failure.
More advanced network technologies, like SONET, and some forms of clustering, incorporate
built-in failover capabilities that attempt to automatically recover from some failures.
While these and similar approaches have been a part of IT practice for many years, more
sophisticated disaster recovery techniques have grown in popularity due to the events of 11
September 2001.
Periodic data backups, for example, have limited value if the "snapshots" are not taken
frequently enough. Some organizations now generate so much data that even daily backups are
too infrequent.
A more sophisticated approach like disk mirroring ensures that data remain available from
multiple sources in near real-time. However, traditional mirroring only works over limited
distances. Storage area network (SAN) and other competing technologies can alleviate this
problem, albeit at a higher cost.
Another recent trend in IT disaster recovery planning, third-party relocation services, gives
organizations access to fully-equipped operations space at temporary facilities in remote
locations. These facilities can be a wonderful option in times of crisis... if trained personnel are
available to staff them.
Why we Monitor?
To provide:
1. Performance Tuning - Improve service - proactively id & reduce bottlenecks, tune and
optimize systems, improve QOS, optimize investments - id under/over utilized resources,
balance workloads
2. Trouble Shooting - Get out of crisis mode, id probs & start diagnosis/fixing before end
user notices, increase reliability/availability, allow user to accomplish work more
effectively and maximize productivity.
3. Planning - understand performance trends for planning
4. Expectations - set expectations for the Distributed System (from network thru
applications) and see how well they are met
5. Security
6. Accounting
Fault
The goal of fault management is to recognize, isolate, correct and log faults that occur in the
network.
Errors primarily occur in the areas of fault management and configuration management.
Fault management is concerned with detecting network faults, logging this information,
contacting the appropriate person, and ultimately fixing a problem. A common fault management
Configuration
Accounting
The goal is to gather usage statistics for users. Accounting management is concerned with
tracking network utilization information, such that individual users, departments, or business
units can be appropriately billed or charged for accounting purposes. While this may not be
applicable to all companies, in many larger organizations the IT department is considered a cost
center that accrues revenues according to resource utilization by individual departments or
business units.
Performance
The goal is to both prepare the network for the future, as well as to determine the efficiency of
the current network. Performance management is focused on ensuring that network performance
remains at acceptable levels. This area is concerned with gathering regular network performance
data such as network response times, packet loss rates, link utilization, and so forth. This
information is usually gathered through the implementation of an SNMP management system,
either actively monitored, or configured to alert administrators when performance move above or
below predefined thresholds. Actively monitoring current network performance is an important
step in identifying problems before they occur, as part of a proactive network management
strategy etc .....
Security
The goal of security management is to control access to assets in the network. Security
management is not only concerned with ensuring that a network environment is secure, but also
that gathered security-related information is analyzed regularly. Security management functions
include managing network authentication, authorization, and auditing, such that both internal and
external users only have access to appropriate network resources. Other common tasks include
the configuration and management of network firewalls, intrusion detection systems, and
security policies such as access lists.
Self Check
1. Check your own computer’s configuration. What commands can you use? Keep a record
of these configurations for more activities to follow.
2. Check your own computer connection to the network. What commands can you use?
3. Use the ping command to find other computers on your network. Test your connection to
the DNS server, Default Gateway, and WINS server, if they are available on your
network.
4. Use the ping command to find other computers that are not on your network.
5. Use the tracert command to find out how many routers you need to go through to access a
website.
6. What does the acronym ‘PING’ stand for?
7. What is the PING command used for?
8. What does the acronym ‘DNS’ stand for?
9. What is the purpose of DNS?
10. What does the acronym ‘TCP/IP’ stand for?
11. List the general order of events for testing network connectivity.
12. What is involved in connecting a computer to a Local Area Network (LAN)?
13. Why you monitor your computer network regularly?
Feedback
1. You should have used either of the following commands to check your computer’s
configuration. Note that the second command will display more information:
ipconfig
ipconfig/all
ping 127.0.0.1 — This will give a very fast response, and just proves that IP is installed.
It is fast because the network adaptor or dial-up adaptor is not even used.
ping x.x.x.x, where x.x.x.x is the IP address of your own computer.
ping NameOfComputer, where NameOfComputer is the actual name of your computer.
For example, in Windows, this name can be found from going to Start, Control Panel,
System Properties. Or, from the ipconfig/all command, it is beside Host name.
3. Use the results from the command ipconfig/all to enter the correct IP address.
ping x.x.x.x, where x.x.x.x is the IP address of the computer you wish to view.
ping NameOfComputer and type in the name of the computer you wish to view, rather
than its IP address.
4. ping Address Of Website and type in the address of the website you wish to view rather than
its IP address. For example:
ping www.tafe.nsw.edu.au
ping x.x.x.x, where x.x.x.x is the IP address of the machine hosting the web server. To
determine the IP address of a machine hosting the website, just ping the domain name,
and the ping reply will give you the IP address it is actually pinging after resolving the
name.
5. Tracert AddressOfWebsite and type in the address of the website you wish to view rather than
its IP address. For example:
tracert www.tafe.nsw.edu.au
ping x.x.x.x, where x.x.x.x is the IP address of the website page. You will probably not
be able to find this, but in some cases when you first open a website page, the IP address
may be displayed in the status bar of your computer.
7. The PING command is used to check connectivity to the computer you are ‘pinging’. For
example, the command ping 192.168.0.1 will send a response back if it can find the computer on
the network with the IP address of 192.168.0.1.
The response will send back a ‘time out’ response if the computer or website is not found.
Another example is ping www.abc.com.au. This ping command will firstly use DNS to
resolve the name www.abc.com.au to an IP address, then ping the machine at that IP
address. That is, the response will always come from the machine, not the website or
page. We will still get a response from the machine if it is up and running. The web
server itself could be down.
This way we know if we can’t get a page on our browser, but we can still ping the name,
that everything is working except the actual web server.
8. Domain Name System (note that ‘Server’ and ‘Service’ are also used.)
9. DNS translates domain names into the numeric IP address so the computer systems can
understand it.
10. The acronym TCP/IP stands for Transport Control Protocol/Internet Protocol.
11.
1. Check all physical connections: cables into the back of the computer, cables into hubs,
switches and routers.
2. Check the cables themselves; they may be damaged or incorrectly wired, or somebody
could have introduced an unlabelled crossover cable into the network room.
3. Check that all drivers are installed for the network card.
4. Check that the network client software is installed.
5. Check all the IP configurations on the computer. This will include, IP address (with
unique host portion), subnet mask, DNS, default gateway and WINS.
6. Check that the computer has a unique name on the workgroup/domain.
7. Check that the correct name of the workgroup or domain is entered.
In summary: these do not need to be in this exact order you should however specify:
Physical connections
All IP configurations and related software.
Name of the workgroup/domain.
1. Check physical connections — that the network card and cables are secured, and the
network card driver is installed.
2. Check the cables themselves (as above); they may be damaged, or incorrectly wired, or
somebody could have introduced an unlabelled crossover cable into the network room.
3. Check that the network client is installed.
4. Check that the IP address is entered along with the correct subnet mask.
5. Check that the workgroup the computer is a member of is entered correctly.
6. If others need to access files or a printer attached to the computer, then install the printer:
File and Print service.
7. If the network is configured on a Domain, then check:
a. the DNS address
b. if DHCP is enabled if required or that the IP address and subnet mask are
correctly entered for the network.
c. WINS address if connecting to older versions of Windows; WINS does the
equivalent of DNS for older Windows versions.
13.
To provide:
1. Performance Tuning
2. Trouble Shooting
3. Planning
4. Expectations
5. Security
6. Accounting