Professional Documents
Culture Documents
5 - Network Troubleshooting V2.0
5 - Network Troubleshooting V2.0
5 - Network Troubleshooting V2.0
TROUBLESHOOTING
DEC30023
CHAPTER 5
NETWORK TROUBLESHOOTING
⦿ How to identify ?
◼ Is access to the LAN or WAN affected?
◼ Is network performance affected?
◼ Are data or programs affected? Or are both affected?
◼ Are only certain network services (such as printing)
affected?
◼ Is one user or are multiple users affected?
⦿ If programs are affected, does the problem
include one local application, one networked
application, or multiple networked
applications?
⦿ What specific error messages do users report?
⦿ Is one user or are multiple users affected?
⦿ Do the symptoms manifest themselves
consistently?
b. IDENTIFY THE AFFECTED AREA
ANS.
Question the individual who reported the problem as
well as any other affected user.
Collect information or documentation about any
equipment that may be affected.
Use the appropriate monitoring tools.
Upon completion of this topic, students should be able to:-
2) Bad wiring:
• incorrect type of cable which used for specific works, or loose
wiring
3) Open, short:
• broken copper strand, which prevents current flowing through the
circuit. short will happen when 2 connectors of copper touches
each other
• It can be due to twist or miswiring in the cable at the cut admitting
to touch the bare wires.
4) Split cables:
• Most of the spilt in the cables are intentional which enables you to
runs the wirings in so many directions by using splitter.
PHYSICAL PROBLEMS
5) DB losses:
• The signal power of the data transmission sometime degraded at
one point where transmissions are not perfectly interpreted by the
receiving device. This loss in a signal power is called as a decibel
loss or dB loss. It may occur due to excess distance which is above
the fiber or copper cable limitations.
6) TXRX reversed:
• Reverse connections of the transmit to transmit and receive to
receive, which will never work properly. These kinds of reversal can
evoke by an improper connection of wires on the wall patch or jack
panels.
7) Cable replacement:
• Correct cable replacement in the network or datacenter throughout
the building and closest is necessary for the reliable and effective
communications
PHYSICAL PROBLEMS
8) EMI/ Interference:
• Anything which produces a magnetic field must be avoided when
positioning the cable. It also includes speakers, mobile telephones,
power facilities, florescent lights, electric motors, copy machines,
refrigerators, amplifiers, microwave oven and much more. This
property type which affected by an external magnetism is known as
EMI - electromagnetic interference.
9) Distance:
• cable has to use based on network topology and distance between
those components. Most of the technologies of network
communications agonize from the attenuation, which is signal
degradation due to its medium.
10) Crosstalk:
• signal between 2 wires which carries current and adjacent to one
another.
• To eliminate crosstalk completely, usage of fiber optic cable is
more recommendable.
• The twists (for twisted pair cable) are the one which helps to
reduce the crosstalk and more twist will reduce more and so more
twists are efficiently better.
QUESTION
You have a user who cannot connect to a network. Based
on your knowledge as a technician, which components you
should check if you are dealing with physical
network problems? Relate common physical connectivity
problems with the components..(5 marks)
ANS.
Components you should check:
⚫ The network card on the computer.
⚫ The network cable.
⚫ The network card on the other computer, or the router port.
Common physical connectivity problems:(choose any 2, 1 mark each)
⚫ Bad connectors
⚫ TX / RX reversed
⚫ Bad wiring
⚫ Cable Replacement
⚫ Open, short
⚫ Eml / Interference
⚫ Split cables
⚫ distance
⚫ dB loss
⚫ Crosstalk
Upon completion of this topic, students should be able to:-
❑ Ipconfig
⦿ Ipconfig is used to display the current IP
configuration information for a host. Issuing
this command from the command prompt will
display the basic configuration information
including: IP address, subnet mask and
default gateway.
Perform troubleshooting using ipconfig command
to examine IP configuration information on a
host(cont’ed)
❑ Ipconfig/all
⦿ Ipconfig/all is used to displays additional
information including the MAC address, IP
addresses of the default gateway and the DNS
servers. It also indicates if DHCP is enabled, the
DHCP server address and lease information.
⦿ How can this utility assist in the troubleshooting
process? Without an appropriate IP
configuration, a host can not participate in
communications on a network. If the host does
not know the location of the DNS servers it
cannot translate names into IP addresses.
Perform troubleshooting using ping command to examine IP
configuration information on a host to examine end-to-end
connectivity between hosts.
❑ Ping
⦿ If the IP configuration appears to be correctly configured on the
local host, next, test network connectivity by using ping. Ping is
used to test if a destination host is reachable. The ping command
can be followed by either an IP address or the name of a
destination host, e.g : ping 192.168.7.5 or ping www.cisco.com
⦿ When a ping is sent to an IP address, a packet known as an echo
request is sent across the network to the IP address specified. If
the destination host receives the echo request, it responds with a
packet known as an echo reply. If the source receives the echo
reply, connectivity is verified.
⦿ If a ping is sent to a name, e.g. www.cisco.com, a packet is first
sent to a DNS server to resolve the name to an IP address. Once
the IP address is obtained, the echo request is forwarded to the IP
address and the process proceeds. If a ping to the IP address
succeeds, but a ping to the name does not, there is most likely a
problem with DNS.
** WHEN TROUBLESHOOTING PC PROBLEMS**
⦿ 1.Determine whether the user can ping the loopback
address: ping 127.0.0.1.
-If this fails, then something is wrong with the TCP/IP
stack installation on the PC.
⦿ 2.Next, have the user try to ping the locally
configured IP address.
-If this fails, something is wrong with the IP address
configuration on the PC.
⦿ 3.Next, have the user ping the default gateway.
-If this fails, then something is wrong with the
configured default gateway address, the default
gateway itself, or the subnet mask value configured on
the user’s PC.
Perform troubleshooting using tracert
command to verify end-to-end connectivity
❑ Tracert
⦿ The ping utility can verify end-to-end connectivity. However, if a
problem exists and the device cannot ping the destination, the
ping utility does not indicate where the connection was actually
dropped. To accomplish this, another utility known as tracert must
be used.
⦿ The Tracert utility provides connectivity information about the
path a packet takes to reach the destination and about every
router (hop) along the way. It also indicates how long a packet
takes to get from the source to each hop and back (round trip
time). Tracert can help identify where a packet may have been
lost or delayed due to bottlenecks or slowdowns in the network.
⦿ The basic tracert utility will only allow up to 30 hops between a
source and destination device before it assumes that the
destination is unreachable. This number is adjustable by using the
-h parameter. Other modifiers, displayed as Options in the graphic,
are also available.
5.1.7 Perform troubleshooting using tracert
command to verify end-to-end
connectivity(cont’ed)
❑ Traceroute
❑ Netstat
⦿ Sometimes it is necessary to know which active TCP
connections are open and running on a networked host. Netstat
is an important network utility that can be used to verify those
connections. Netstat lists the protocol in use, the local address
and port number, the foreign address and port number, and the
state of the connection.
⦿ Unexplained TCP connections can pose a major security threat.
This is because they can indicate that something or someone is
connected to the local host. Additionally, unnecessary TCP
connections can consume valuable system resources thus
slowing down the host's performance. Netstat should be used to
examine the open connections on a host when performance
appears to be compromised.
⦿ Many useful Options are available for the netstat command.
5.1.9 Perform troubleshooting using nslookup to
determine DNS server performance
❑ Nslookup
⦿ When accessing applications or services across the
network, individuals usually rely on the DNS name
instead of the IP address. When a request is sent to
that name, the host must first contact the DNS server
to resolve the name to the corresponding IP. The host
then uses IP to package the information for delivery.
⦿ The nslookup utility allows an end-user to look up
information about a particular DNS name in the DNS
server. When the nslookup command is issued, the
information returned includes the IP address of the DNS
server being used as well as the IP address associated
with the specified DNS name. Nslookup is often used as
a troubleshooting tool for determining if the DNS server
is performing name resolution as expected.
QUESTION
A user informs you that she cannot access the internet
using her laptop. When you visit her, you run the
ipconfig/all utility and see the following information. What
is the most possibility reason the user is having that
problem.??. (CLO1,C3)
A. ping
B. Tracert
C. Netstat
D. ipconfig
ANS : B
QUESTION (ESSAY) 0616,
You are troubleshooting the network connectivity for one of the client
systems at your company, but you do not know the IP address for the
system. Now you are at the client system and you want to make sure
the system can communicate with itself using TCP/IP. Before making
a solution, you have to identify SIX(6) steps that are involved in the
basic troubleshooting methodology. Next, determine and explain
briefly the TCP/IP utility that can be used to view the IP address.
(15 marks)
ANS.
SIX (6) steps that involved in basic the troubleshooting methodology:
1. Identify the symptoms and potential causes
2. Identify the affected area
3. Establish what has changed (software, hardware)
4. Implement an action plan and solution
5. Test the result
6. Document the solution
ANS.
The host www.ptsb.com did not answer to the ping command.
There is a connectivity problem between the client and the
website.
THREE (3) steps to diagnose the problem using PING command:
1. PING to localhost (127.0.0.1)**
2. PING to gateway (use tracert to find gatewav)
3. PING to well known host
** additional notes
If you can PING 127.0.0.1, which is the loopback address, it means that your
computer’s network software works. If you can not PING 127.0.0.1 successfully, you
may have to reinstall the network software.
5.1.10 DESCRIBE VARIETY OF SOFTWARE AND
HARDWARE TOOLS TO DIAGNOSE PROBLEMS
⦿ Network Diagnostics
By using Network Diagnostics, you can isolate network issues relating to
•Network connectivity problems
•Configuration settings for network adapters, modems, and network clients
•Internet service configuration settings for proxies, newsgroups and e-mail.
•DNS, DHCP, and WINS configuration settings
•Default gateways and IP addresses
•Protocol Analyzers
Upon completion of this topic, students should be able to:-
ANS.
Boot the PC and Run anti-virus and anti-spyware application
from external drive (3m)
Restart the computer and test keyboard again(2m)
QUESTION (STRUCTURE NO.3) JUN15,
b. Amin is a network administrator, he want to expand the Wireless
Local Area Network to another place that has no coverage. With the
diagram, explain what should he do?(7 marks)
ANS.
Draw
diagram
and label
(6 m)
Internet
ANS.
Use PING command to check the connectivity(1m)
The PING command display whether the destination responded
and how long it took to receive a reply (2m)
If there is an error in the delivery for the destination, the PING
command displays an error message(2m)
QUESTION (STRUCTURE NO.4) JUN15,
c. One host cannot connect to Access Point(AP) although entering the
key. Analyze the problem and explain how to fix the
problem.(7marks)
ANS.
Most common settings that are configured incorrectly include
the SSID, authentication and encryption (1m)
a. The SSID is a case sensitive, alpha-numeric string up to 32
characters. It must match on both the AP and client. (1m)
- If the SSID is broadcast and detected, this is not an issue.
- If the SSID is not broadcast, it must be manually entered onto
the client. If the client is configured with the wrong SSID, it
will not associate with the AP (1m)
ANS.(CONTI’ED)
ANS.
SIX (6) steps that involved in basic the troubleshooting methodology (9m)
1. Identify the symptoms and potential causes
2. Identify the affected area
3. Establish what has changed (software, hardware)
4. Implement an action plan and solution
5. Test the result
6. Document the solution
ANS.
1. Unroll the required length of network cable and add a little extra
wire, just in case…………………………………………………………………………….. (1m)
If a boot is to be fitted, do so before stripping away the sleeve and ensure the
boot faces the correct way.
2. Carefully remove the outer jacket of the cable when stripping the
jacket so not cut the internal wiring (cut with knife about an inch toward
the open end…………………………………………………………………………………..(1m)
3. Inspect the newly revealed wires for any cuts that expose the cooper
wire inside.
If you breached the protective sheath of any wire, you need to do step
one again………………………………………………………………………………………..(1m)
4. Untwist the pairs so they will lay flat between your fingers…….(1m)
QUESTION (ESSAY) 0615,
ANS.(CONTI’ED)
5. Arrange the wires based on the wiring specifications. There are two
methods set by TIA, 568A and 568B……………………………………………… (1m)
A straight cable is used to connect two different-layer devices (e.g. a hub and a
pc).
Two same devices normally require a cross-over cable.
Put the wires in the following order, from left to right…………….. (2m for
colour code diagram below).
WRITE DOWN THE COLOUR CODE E.G. WHITE /GREEN, GREEN, WHITE/ORANGE….
QUESTION (ESSAY) 0615,
ANS.(CONTI’ED)
6. Press all the wires flat and parallel between your thumb and
forefinger. Verify the colourshave remained in correct
order……………………………… (1m)
Cut the top of the wires about ½ inch from the base of the jacket. (1m)
7. Keep the wires flat and in order as you push them into the RJ45
connector with the flat surface of the plug on top…………………………….(1m)
The white/orange wire should be on the left if you’re looking down at
the jack.………………………………………………………………………………………….(1m)
You should be able to see a wire located in each hole, as seen at te
bottom right.
8. Place the wired plug into crimping tool. Give the handle a firm
squeeze. …………………………………………………………………………………………….(1m)
You should hear a ratcheting noise as you continue. Once you have
completed the crimp, the handle will reset to the open position…(1m)
To ensure all pins are set, some prefer to double-crimp by repeating
this step.
9. Repeat all of the above steps with the other end of the cable….. (1m)
10. Test te cable to ensure that it will function in the field using cable