0% found this document useful (0 votes)
95 views8 pages

Eight Steps To Successful Troubleshooting: Step 1. Identify The Exact Issue

The document discusses the key aspects of successful troubleshooting. It emphasizes that troubleshooting requires knowledge, skills, experience, and the right tools. Technicians should thoroughly study all available data, understand how components work, and remember that issues are often due to improper usage rather than defects. While training is important, true expertise comes from trial and error, collaboration, and applying tried-and-true methods. The document outlines eight steps for successful troubleshooting, including defining the problem, recreating it, isolating the cause, developing a solution plan, implementing the plan, verifying the solution, documenting, and providing feedback.

Uploaded by

abebe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views8 pages

Eight Steps To Successful Troubleshooting: Step 1. Identify The Exact Issue

The document discusses the key aspects of successful troubleshooting. It emphasizes that troubleshooting requires knowledge, skills, experience, and the right tools. Technicians should thoroughly study all available data, understand how components work, and remember that issues are often due to improper usage rather than defects. While training is important, true expertise comes from trial and error, collaboration, and applying tried-and-true methods. The document outlines eight steps for successful troubleshooting, including defining the problem, recreating it, isolating the cause, developing a solution plan, implementing the plan, verifying the solution, documenting, and providing feedback.

Uploaded by

abebe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

If the person troubleshooting does not have a working knowledge of the

technology, adequate information gathered from multiple points or information


sources, or is lacking experience for a broader interpretation, then incorrect
assumptions and conclusions are made. The accuracy and speed of
troubleshooting depends on the knowledge, skill, and experience of each techni-
cian involved, and the tools at their disposal.

The successful technician will thoroughly study whatever data is available and
develop in-depth insight into the function of all components and how to operate
them. Finally, he or she will remember that conditions appearing to be serious
defects are often the result of improper usage or operator error.

The foundation of this insight is usually gained through formal training.


However, the true troubleshooting master learns through trial and error,
comparing notes with others, and discovering tried-and-true methods that are
not often taught in school. Following a good formula or process for
troubleshooting that includes careful documentation of your actions and your
hypothesis for what might be causing each problem can help shorten your
learning curve and at the same time shorten the time required to solve network
problems.

Two extreme approaches to troubleshooting almost always result in


disappointment, delay, or failure. On one extreme is the theorist, or rocket
scientist approach. On the other is the practical or caveman approach. Since
both of these approaches are extremes, the better approach is somewhere in
the middle using elements of both.

Eight steps to successful troubleshooting


1. Identify the exact issue or problem.
2. Recreate the problem if possible.
3. Localize and Isolate the cause.
4. Formulate a plan for solving the problem.
5. Implement the plan.
6. Test to verify that the problem has been resolved.
7. Document the problem and solution.
8. Provide feedback to the user.

Step 1. Identify the exact issue.


Defining the scope of the problem and deciding on the exact issue is important.
Have the person who reported the problem explain how normal operation
appears, and then demonstrate the perceived problem. If the reported issue is
described as intermittent, instruct the user to contact you immediately if it ever
happens again. It is very difficult to fix something that is clearly working just fine
right now.
Do not discount what the user reports simply because it sounds implausible. The
user does not have your knowledge of networking, and is probably describing
the problem poorly. Something annoyed the user enough to contact you.

Note: Has it ever worked? If the reported failure has never worked properly,
then treat the situation as a new installation and not a troubleshooting event.
The process and assumptions are completely different. www.flukenetworks.com 9
Step 2. Recreate the problem.
Ask yourself if you understand the symptoms, and verify the reported problem
yourself if possible. Problems are much easier to solve if they can be recreated
on demand. Seeing the problem will allow you to observe error messages and
various symptoms the user may not think important to relate, and may even
provide the opportunity for you to collect network statistics during the event.

If the problem is intermittent, instruct the user what sort of symptoms are likely
and provide a written list of what questions you are seeking answers to so the
user can gather some of the information if you are unable to respond quickly
enough to see it yourself. When possible, leave a diagnostic tool to gather
information continuously. A protocol analyzer may be left gathering all traffic
from the network and overwriting the buffer as it fills. Have the user halt its
operation and/or store the current test results from other testers immediately
upon rediscovering an intermittent problem.

Step 3. Localize and isolate the cause.


Once you have defined the problem, and recreated it if necessary, you should
attempt to isolate that problem to a single device, connection, or software
application. Reducing the scope of the problem in this way is where divide-and-
conquer begins; the goal is to isolate the problem to the smallest element that
could cause the problem. Test for and eliminate as many variables as possible.
You may need to scan for a virus at this point.

Is there any normal function missing, or is there an abnormal response? Use the
data gathered by your network monitoring tools to aid you in this process.

Introduction to troubleshooting Fluke Networks 10 Frontline LAN troubleshooting


guide
Determine whether anything was altered at that station or on the network just
before the problem started. Often the user does not realize that changing
something seemingly unrelated can cause problems on the network, such as
rearranging the location of a portable heater or photocopier, or installing a new
software application or adapter card. Do not discount the local environment
when you are looking for change. Temperature changes (heat is often a
problem), electrical use from adjacent spaces including nearby businesses,
time of day, and influences from electronic sources. Even the passage of an
elevator, or use of a cordless phone, should be noted.

Can the problem be duplicated from another station, or using other software
applications at the same station? Identify whether the problem is limited to one
station, or one network resource such as a printer. Move one segment closer to
the network resource and try again. If the problem goes away when you move
closer to the network resource, test or replace the intervening infrastructure
equipment.

If the problem affects an entire shared media segment, isolate the problem by
reducing the variables to the fewest possible number. Try shortening the cable
segment on a bus topology, or temporarily re-cabling a ring or star topology to
create the smallest possible network for troubleshooting purposes. Try a
different switch or hub. If the problem is on the same, shared media segment as
the network resource, try turning off or disconnect all but two stations. Once
those two are communicating, add more stations. If they are not
communicating, check the physical layer possibilities such as the termination of
the cable, the cable itself, or the specific ports used on the infrastructure
equipment (hubs and switches).www.flukenetworks.com 11
If the problem can be isolated to a single station, try a different network
adapter, a fresh copy of the network driver software (without using any of the
network software or configuration files presently found on that station delete
them if necessary). Try accessing the network using a diagnostic tool from the
existing network cable connection for that station. If the network connection
seems intact, determine if only one application exhibits the problem. Try other
applications from the same drive or file system. Compare configurations with a
nearby but operational workstation. Try a fresh copy of the application software
(again using none of the existing software or configuration files).

If only one user experiences the problem, check the network security and
permissions for that user. Find out if any changes have been made to the
network security that might affect this user. Has another user account been
deleted that this user was made security equivalent to? Has this user been
deleted from a security grouping within the network? Has an application been
moved to a new location on the network? Have there been any changes to the
system login script, or the users login script? Compare this users account with
another users account that is able to perform the desired task. Have the
affected user log in and attempt the same task from a nearby station that is not
experiencing the problem. Have the other user log in to the problem station and
try the same task.

Step 4. Formulate a plan for solving the problem.


Once a single operation, application or connection is localized as the source of
the problem, research and/or consider the possible solutions to the problem.
Consider the possibility that some solutions to the problem at hand may
introduce other problems.

Introduction to troubleshooting Fluke Networks 12 Frontline LAN troubleshooting


guide
Note 1: To avoid unwanted repetition, and to make it possible to back-out
any changes made should things get worse, be sure to carefully and completely
document all actions taken during the problem resolution process. Copy all
configuration files to a safe place before modifying them especially on
switches, routers, firewalls, and other key network infrastructure devices.

Note 2: It is advantageous to open a second terminal session into the switch or


router where the commands required to reverse a configuration change are
typed in and ready to execute prior to actually implementing the change in the
first window. This is likely the fastest way to recover from changes that
adversely affect your network.

Step 5. Implement the plan.


Your actual solution to the problem may be replacing a network device, NIC,
cable, or other physical component. If the problem is software, you may have to
implement a software patch, reinstall the application or component or clean a
virus infected file. If the problem is the user account, the users security settings
or logon scripts may need to be adjusted.

For network hardware, it is most expedient to simply replace a part, and attempt
to repair the part later. Another option is to change the connection to a spare
port and cover or otherwise mark the suspect port. Remember than the goal is
to restore full operation of the network as soon as possible.

Two avenues exist for solving software problems. The first option is to reinstall
the problem software, eliminating possibly corrupted files and ensuring that all
required files are present. This is an excellent way to ensure that the second
option reconfiguring www.flukenetworks.com 13
the software works on the first try. Many applications allow for a software
switch that tells the installation program to disregard any existing configuration
files, which is a good way to avoid being misled by the error and duplicating it
yet again. If this option is not evident, then it is often better to remove the
application before reinstalling it.

If the problem is isolated to a single user account it is often faster to repeat the
steps necessary to grant the user access to the problem application or operation
as if the user had never been authorized before. By going through each of these
steps in a logical order, you will probably locate the missing or incorrect element
faster than by spot-checking. In some situations, it may be expedient to simply
delete the whole account and start over.

Step 6. Test to verify that the problem has been resolved.


After you have implemented the solution, ensure that the entire problem has
been resolved by having the user test for the problem again. Also, have the user
quickly try several other normal operations with the equipment. It is not unheard
of for a solution to one problem to cause other problems, and sometimes
whatever was repaired turns out to be a symptom of another underlying
problem.

Step 7. Document the problem and solution.


Documentation is useful for several reasons. First, documentation can be used
for future reference to help you troubleshoot the same or similar problem. You
can also use the documentation to prepare reports on common network
problems for management and/or users, or to train new network users or
members of the network support team.

Introduction to troubleshooting Fluke Networks 14 Frontline LAN troubleshooting


guide
Step 8. Provide feedback to the user.
There is often the temptation to fix the problem and leave. However, if a
network user reported the problem they will appreciate knowing what
happened. This will encourage them to report similar situations in the future,
which will improve the performance of your network. Another reason for
feedback is that if the user could have done something to correct or avoid the
issue, it may reduce the number of future network problems.

A good working relationship between network support staff and the user
community can significantly enhance your ability to keep the network running
smoothly. Failure to take users seriously, or making unprofessional and
condescending remarks can cause adversarial relations to develop, and can
undermine your ability to do your job.

There is also a saying that 75% of fixing a problem is fixing the user. If the
user does not agree that the problem has been taken to its conclusion (whether
the problem has been corrected, or you have explained to the users satisfaction
that a fix is impossible for the following technical, financial, or political
reasons), then you have not ended this support issue.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy