Zen ch20
Zen ch20
528
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 529
Test Specific
■ Troubleshooting Tools
While working through the process of finding the cause of a problem, you will
need to use many tools. Some of these tools are difficult to quantify—including
things like asking questions, referring to your network baselines and docu-
mentation, and synthesizing your network knowledge. Other tools are eas-
ier to describe; these are the software and hardware tools that provide
information about your network. Many of the tools that fall into this cate-
gory have been described already, such as hardware or software loopback
testing devices, utilities like PING and TRACERT, and hardware tools like
tone locators. The trick is knowing when and how to use these tools to solve
your network problems.
“Touchy” Tools
No matter what the problem,
The tools that are the most difficult to quantify, because they are mostly always consider the safety of
within you, are what I call touchy tools . An example of a touchy tool is ask- your data first. Ask yourself this
ing questions of the person who has the problem. This is touchy because question before you perform
there’s no predetermined set of questions to ask—your background knowl- any troubleshooting action: “Is
what I’m about to do going to
edge and intuition must tell you which questions are the right ones. The
potentially damage data?”
types of questions you should ask can be grouped into a few categories:
■ Questions designed to find out exactly what steps the user took that
may have caused the symptom. This information can help you re-create
the problem. In addition, these types of questions can provide insight
into whether the problem was caused by user error or improper
procedures. Note from the Geek Central Human Relations Department:
be careful how you phrase these sorts of questions. An annoyed,
“What did you do this time, you pinhead?!” tends to cause people
to clam up. Your goal, remember, is to extract information.
■ Questions designed to find out exactly what any error messages said and
the context of the error. This information can be critical when you
need to search manufacturers’ knowledge bases and support lines.
■ Questions designed to find out what the user has tried to do to fix the problem.
This information can help you determine whether you are dealing
with multiple layers of problems. Many users will try to fix things,
but won’t think to write down what they’re doing. When at some
point in the process they reach a standstill and can’t get back to
where they started, they will come crying to you for help. Be gentle!
Your goal is to get the user to remember most, if not all, of the steps
they tried, so you can backtrack to the original problem rather than
troubleshooting a multilayered one.
Another touchy tool you can use is to compare the current situation to
the baselines and documentation you created for your network. When users
complain of slow connections or downloads, for example, you should com-
pare the bandwidth and connection speeds from your baseline to what you
529
Chapter 20: Zen and the Art of Network Support
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 530
Hardware Tools
In Chapter 8, “Installing a Physical Network,” you read about a few hard-
ware tools you use when configuring your network. These hardware tools
include cable testers, protocol analyzers, hardware loopback devices, and
toners. These tools can also be used in troubleshooting scenarios to help you
eliminate or narrow down the possible causes of certain problems. In addi-
tion, there are other pieces of hardware which, although they can’t actively
be used for troubleshooting, can pro-
Cross Check vide clues to the problems you face.
A cable tester enables you to de-
Connecting to the Internet termine if a particular cable is bad.
This chapter assumes you have the tools needed by PCs to connect to Bad can be defined in a variety of
the Internet pretty much nailed down in your mind, so now is a good ways, but it essentially means that
time to cross-check your memory! Turn to Chapter 11, “TCP/IP,” and the cable is not delivering the data
see if you can answer these questions. What’s the purpose of the default for whatever reason—perhaps the
gateway? How does this gateway manifest on a network? Why do you cable is broken, crimped badly, or
need an IP address? Wouldn’t a MAC address suffice? And what’s the sits too close to a heat or electrical
point of a subnet mask? source. In most troubleshooting
530
Mike Meyers’ Network+ Guide to Managing and Troubleshooting Networks
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 531
situations, you will use other clues to determine if you have a hardware or
software problem. Then, if you have narrowed down the problem to a hard-
ware connectivity issue, a cable tester can help you determine if the cable is
good or bad. Another option, if you are without one of these tools, is to re-
place the cables (one at a time) and test the connectivity. In the “I can’t log
on” scenario, for example, if you have determined that everyone else in the
area can log on, and that this user can log on from another location, you have
narrowed the problem to either a configuration or hardware issue. If all net-
work activity is broken (in other words, nothing is available in Network
Neighborhood or you cannot ping the default gateway), you may choose to
test cables connecting the PC to the server. This is not the only option, but it
is one variable that can be tested and eliminated.
Protocol analyzers come in both hardware and software flavors. Most of
the hardware analyzers have an additional software component. These
tools enable administrators to determine what types of traffic are flowing
through their networks. Most analyzers translate the packets flowing over
the network to provide destination, source, protocol, and some information
about content. In a situation where you have a network slowdown, you
might use a protocol analyzer to determine what types of packets are pass-
ing over your network, and where they are originating. In some cases, a dy-
ing network card can produce large numbers of spurious packets, which can
be detected by using a protocol analyzer and noticing that all of the packets
are coming from one location. Once you have narrowed your problem
down to a particular machine, you can concentrate on that rather than
blaming your servers, bandwidth, or other elements.
Software Tools
Throughout the book, you have read about software tools for configuring
your network that can also be applied to troubleshooting. Because most of
these have been described in previous chapters, I’ll just review the basic
purposes of these tools here. Key software troubleshooting tools include the
following:
■ Software-Based Protocol or Network Analyzers These include
applications such as the Network Monitor (NetMon) provided
with most versions of Windows. Also called packet sniffers, such as
the popular Ethereal, included with the CD in this book, network
analyzers collect and analyze individual packets on a network to
determine bottlenecks or security breaches. Use these tools when
you have unexplained slowdowns on your network, to help determine
which machines are sending packets. This enables you to determine
if there is too much broadcasting in general, or if you are the victim
of some more sinister event like a hacker attack.
■ System Logs Applications like Windows NT/2000/XP/2003’s
Event Viewer create system logs that display any errors or problems
that have occurred in your system. If a user repeatedly fails at his logon,
for example, this might be recorded in the appropriate view in the
Event Viewer tool. That information could be the clue you need to
determine that the user is locked out, either because he forgot his
password or because someone has been trying to hack into that
531
Chapter 20: Zen and the Art of Network Support
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 532
Your Toolbox
It always amazes me when a person calls and asks me what tools they need
to become a network tech. My answer is always the same: just your brain—
everything else will pretty much appear when you need it. There is no such
thing as the correct network tech’s toolbox, full of hardware and software
tools you haul around to get networks fixed. I certainly don’t haul around
cable testers, toners, or Time Domain Reflectometers (TDRs). I may bring
them along if I suspect a cabling problem, but I normally won’t dump them
in my backpack until after I suspect a problem.
Software tools all come with the network operating systems themselves.
I don’t need a floppy disk with PING, for example, because it’s on every PC
in the house! The software tools you need to fix a network are sitting there,
ready for you to use. Your task is to know how to use them. It’s the know-how
you need to bring, and in most cases, little or nothing else!
My lack of dependence on a toolkit makes some customers unhappy—
they just can’t reconcile in their minds that I can get their networks up and
running without some big toolbox. At times this has become so much of an
issue that I have brought along a toolkit just to look good! Seriously! I call
that box full of stuff my prop because it’s of no more real use than a rubber
stage sword.
Now that we’re no longer obsessing on carrying the right tools, let’s in-
stead concentrate on the real toolbox—your brain. In an amazingly brazen act
of self-confidence, I have taken the liberty of quantifying the many mental
processes you should use when fixing networks into the following section.
532
Mike Meyers’ Network+ Guide to Managing and Troubleshooting Networks
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 533
Backups
Think about how much work you have done to create nice, stable servers,
responsive workstations, and overall network wonderfulness. Imagine how
many hours your users have spent creating data and storing it on those serv-
ers. Now imagine a virus deleting critical data or configuration files—not a
good situation, for either your blood pressure or your job security. Simple
common sense dictates that you create backups of your data. Repeatedly.
Backups are useless unless they are current. Your users won’t thank you for
restoring a three-week-old copy of a file that gets updated daily. You should
therefore create a backup schedule for your data that ensures it’s backed up
often enough that a useful copy can be restored easily. Your backup plan
should include the following details:
■ When the backups will occur and what the tape rotation schedule
will be
■ What types of backups will be done at each time
■ Where the backups will be stored
Perhaps the most important details are the types of backups and the
schedule, or strategy, for the backups.
533
Chapter 20: Zen and the Art of Network Support
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 534
The motivation for having both the incremental and differential backups
may not be clear at first glance—they seem so similar as to be basically the
Be sure you know the differ- same. Incremental seems the better option at first. If a file is backed up, you
ent types of backups, including
would want to turn off the archive bit, right? Well, maybe. But there is one
which ones change the archive
bits and which ones do not. scenario where that might not be too attractive. Most backups do a big
weekly normal backup, followed by daily incremental or differential
534
Mike Meyers’ Network+ Guide to Managing and Troubleshooting Networks
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 535
Backup Strategies
One of the issues you must address to successfully answer questions on
backups and recoverability is how to choose strategies that meet your needs
for doing backups and restores in your actual network environment. Your
goal is to be able to back up, and then easily restore all the nec-
essary information from all the necessary machines. This can
include both servers and workstations. Decisions about back-
ing up multiple machines can revolve around both hardware
and time factors. Another issue to consider when planning
your backup strategy is what to do with the all-important
tapes. Recognize that you are protecting your network not
only against viruses and other computer-related disasters, but
also against fire, flood, and man-made catastrophes. Let’s look
at a typical network and see how to create a backup strategy.
Shannen works at a small company that has never had any
form of reliable backup. The network consists of a single Win-
dows Server 2003 system that acts as a file server for the entire
network. The file server stores an Access databasea single
.MDB fileconstantly updated during the course of the • Figure 20.3 Restoring from backups
535
Chapter 20: Zen and the Art of Network Support
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 536
business day by almost every user on the network. Each of the client sys-
Tech Tip tems also stores a number of mission-critical Word documents.
Shannen first determines what data needs backing up. She needs to back
Full System Backups
Ever wish you could back up your
up the entire server operating system—about 1.3GB for the operating sys-
entire system? Sure, Windows tem and applications. The Access database is roughly 45MB and hasn’t
has plenty of recovery tools, but grown much in the past year. She then goes through the many Word docu-
they’re not always perfect. Tools ments stored on each user’s system, creates a directory called \Home on the
such as System Restore and the file server with a subfolder for each user, and instructs the users to copy
recovery console are useless if their Word documents to their individual subfolders. Combined, the Word
your hard drive dies. In some documents take up roughly 100MB.
companies, entire systems are This is an interesting side effect of backups. Creating a backup strategy
backed up using a number of often forces network administrators to change the way their network stores
products. These backups are often data. Shannen will also have to enforce a policy (lots of finger wagging and
stored on optical media or on
reminder e-mails) for users to save their work to the server. Perhaps a bit of
massive server drives on the net-
training might also be in order!
work. Although full system back-
ups can be complex to use and
Shannen didn’t have to force the users to copy their data to the server
challenging on your network just for backing up. Many companies sell superb, powerful backup software
bandwidth, the ease of system re- that will enable the administrator to back up multiple systems in almost any
covery makes this approach popu- way he or she might imagine. A single backup job can back up entire sys-
lar for those “I need my computer tems or selectively back up only certain folders on each system. This type of
back NOW!” situations. online backup is popular today. You can even find companies that will back
up your systems over the Internet for a monthly charge.
Now that Shannen has a grasp on the data to back up, she turns her at-
tention to her backup hardware. She has a DLT tape drive with 30-GB capac-
ity tapes—far more than her needs of less than 2GB with plenty of room for
future expansion. This also tells her that a single tape will hold multiple
backupsa handy thing to do to save on tapes! Shannen chooses to use a
differential backup method. She’ll need two tapes: one for the weekly full
backup and one for the daily changes.
Shannen has two more issues to deal with: offsite backups and tape wear
and tear. Backup strategies require some method of rotation of tapes to en-
sure that one backup is offsite in case of a serious disaster, to prolong tape
life, and to retire older tapes. This is called a tape rotation method or a tape
backup scheme. Shannen chooses to use a tape rotation method called Grand-
father-Father-Son. This tried-and-true method has many variations, but the
one Shannen uses works like this. The tape she uses for backup on the last
Friday of each month is called the grandfather tape. She stores this tape
offsite. The tape she uses every Friday (except the last Friday of the month)
is the father tape and is also stored offsite. The tape used for the daily
backup (except on Friday) is called the son. Shannen keeps these tapes
onsite. If a fire wipes out the office,
Try This! she’ll have a complete server
backup that is always less than a
Tape Rotation Methods week old offsite.
Grandfather-Father-Son is only one of many tape rotation methods. Do
a web search for tape rotation methods such as Grandfather-Father-Son,
Tower of Hanoi, and Incremental. Don’t confuse Incremental tape rota- Baselines
tion with the incremental backups—they aren’t the same thing! What The best way to know when a
are the benefits and disadvantages of these different methods? Can you problem is brewing is to know
come up with situations where one tape rotation method might have how things perform when all’s
advantages over another? well with the system. You need to
536
Mike Meyers’ Network+ Guide to Managing and Troubleshooting Networks
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 537
537
Chapter 20: Zen and the Art of Network Support
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 538
538
Mike Meyers’ Network+ Guide to Managing and Troubleshooting Networks
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 539
systems both at rest and in use, using the Performance Monitor as well as
other systems management or network sniffer tools.
NetWare—Console Monitor
On a NetWare server, most of the critical information you might need to see
and document to establish your baseline can be obtained by loading the
Console Monitor application (see Figure 20.9) on the server itself. You can
view the program remotely on a client PC, but it only runs on the server.
Novell NetWare calls a program that runs on the server in this way a
539
Chapter 20: Zen and the Art of Network Support
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 540
Using Baselines
Using baselines requires a serious commitment. Not only do you need to
create them in the first place, you need to monitor them continually to know
when changes take place. Be careful not to be fooled by a bad baseline
make a number of baselines at first to get an idea as to when your network is
most quiet and when it’s most busy. Many administrators like to make dual
baselines: one for when the network/server is at rest and another when the
network/server is at its busiest. This is a matter of personal choicetry both
the single baseline and the dual baseline to see which you prefer.
Troubleshooting Model
No matter how complex and fancy, any troubleshooting model can be bro-
ken down into simple steps. Having a sequence of steps to follow makes the
entire troubleshooting process simpler and easier, because you have a clear
set of goals to achieve in a specific sequence. The most important steps are
the first three—they help you narrow down the cause of the problem to a
specific item. The reason this matters so much is that figuring out what’s
wrong will also probably tell you how to fix the problem, and how to pre-
vent it from happening in the future.
The basics of any troubleshooting model should include the following
steps:
540
Mike Meyers’ Network+ Guide to Managing and Troubleshooting Networks
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 541
Establish What Has Changed That Might Have Caused the Problem
After determining the extent of a problem, the next step is to eliminate all
the extra variables, that is, all the incorrect possible causes of the problem. If
you have determined that the problem is specific to that user on that ma-
chine, you have already learned a great deal. First, you have learned that
this isn’t a user account problem, because that user was able to log in from
another machine. You have also determined that it isn’t user error, because
you’ve tried it yourself. By having other users at other machines success-
fully try the task, you eliminated the possibility that the server is down.
541
Chapter 20: Zen and the Art of Network Support
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 542
involve further work behind the scenes. Isolating questions are designed to
home in on the likely cause of the problem. Here are some examples:
■ “Tell me exactly what you were doing when the problem occurred.”
■ “Has anything been changed on the system recently?”
■ “Has the system been moved recently?”
Notice the way I’ve tactfully avoided the word you, as in “Have you
changed anything on the system recently?” This is a deliberate tactic to
avoid any implied blame on the part of the user. Being nice never hurts and
it makes the whole troubleshooting process more friendly.
You should be asking some isolating questions internally of yourself,
such as, “Was that machine involved in the software push last night?” or
“Didn’t a tech visit that machine this morning?” Note that you will only be
able to answer these questions if your documentation is up to scratch. Some-
times, isolating a problem may require you to check system and hardware
logs (such as those stored by some routers and other network devices), so
make sure you know how to do this.
Implement a Solution
Once you think you have isolated the cause of the problem, you should de-
cide what you think is the best way to fix it, and then try your solution,
whether that’s giving advice over the phone to a user, installing a replace-
ment part, or adding a software patch. All the way through this step, try
only one likely solution at a time. There’s no point in installing several
patches at once, because then you can’t tell which one fixed the problem.
Similarly, there’s no point in replacing several items of hardware (such as a
hard disk and its controller cable) at the same time because then you can’t
tell which part (or parts) was faulty. As you try each possibility, always doc-
ument what you do and what results you get. This isn’t just for a future prob-
lem, either—during a lengthy troubleshooting process, it’s easy to forget
Remember these problem exactly what you tried two hours before, or which thing you tried produced
analysis steps:
a particular result. Although it may take longer to be methodical, it will save
■ Establish the symptoms time the next time—and it may enable you to pinpoint what needs to be
■ Isolate the cause done to stop the problem from recurring at all, thereby reducing future call
■ Establish what has changed volume to your support team—and as any support person will tell you,
■ Ask isolating questions that’s definitely worth the effort!
■ Identify the most probable
cause Test the Solution
■ Implement a solution This is the part everybody hates. Once you think you’ve fixed a problem, you
■ Recognize potential effects should try to make it happen again. If you can’t, great! But sometimes you
of the solution
will be able to re-create the problem, and then you know you haven’t finished
■ Document the solution
the job at hand. Many techs want to slide away quietly as soon as everything
542
Mike Meyers’ Network+ Guide to Managing and Troubleshooting Networks
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 543
Troubleshooting as Art—
Mike’s Four-Layer Model
Troubleshooting is not something that can be definitively described in a nice
neat list of ten easy steps. It is more of an art—an ability to become “one with
the network” and intuit where the problems are hiding. The best trouble-
shooters are those who have a huge amount of knowledge about every ele-
ment of the network—hardware, software, connections, and so on. These
people can then synthesize all that knowledge into good guesses about where
to start looking for problems. All of the previous steps give you a theoretical
concept of where to look and how to proceed when troubleshooting your
543
Chapter 20: Zen and the Art of Network Support
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 544
own network. The theory, however, is easier to implement in real life if you
know where (and where not) to look within the network to find the problem.
The troubleshooting model does a great job of describing the steps nec-
essary to get a network problem fixed, but it doesn’t tell you where to look in
the first place. So how do you figure out where to look for problems? Some
might think to use the OSI seven-layer model, but while the OSI seven-layer
model provides a superb tool for those who create network hardware and
software, it doesn’t do a lot for the folks who need to work on a network ev-
ery day. Instead, I use a model that I modestly call Mike’s Four-Layer
Model. The Four-Layer Model concentrates on the main components of the
hardware and software you need to deal with to make a networking system
work, while ignoring the parts of the hardware and software over which
you have no control. The core idea behind the four layers of my model is that
you can access, change, remove, install, troubleshoot, and fix every layer—
unlike most of the layers of the OSI seven-layer model.
The Four-Layer Model breaks all networks into—surprise!—four major ar-
eas: Hardware, Protocols, Network, and Shared Resources. No matter what
specific networking hardware or software you use, every one of these four lay-
ers exists—although some network operating systems like to hide them! If you
The layers of Mike’s understand Mike’s Four-Layer Model, you should have no problem fixing just
Four-Layer Model are about any network, any time. By using the Four-Layer Model when you have a
1. Hardware problem with a network, you’ll never find yourself saying, “I have no idea why
2. Protocols this is happening to my network! What do I do?” Instead, you’ll find yourself
3. Network
saying, “I know why this problem exists. I just need to figure out how to fix it!”
Trust me, figuring out how to fix a known problem is a lot easier than trying to
4. Shared Resources
troubleshoot a mystery problem on your network.
Mike’s Four-Layer Model also ignores the function of the layers and con-
centrates instead on what you need to do to make the layers function (that is,
what you do to verify that a particular layer works correctly or needs diag-
nosing). For example, if you’ve installed the hardware correctly, then the
hardware layer works. To determine this, you run a certain type of test (like
pinging another system), and if you’re successful, you in essence check off
the hardware layer as good and move on to the next one.
Some of my critics suggest that if diagnostic success is the goal, then my
Four-Layer Model is by definition not a true model; they argue that it’s
nothing more than a diagnostic procedure. These people do have a point—if
you get technical about it, my Four-Layer Model is nothing more than a di-
agnostic procedure. Here’s what I have to say to those critics: “Well, it’s the
best darn totally-universal, easy-to-understand, 100-percent-accurate, prac-
tical diagnostic procedure you’ll ever meet! Six weeks after the Network+
exam, you’ll probably have forgotten most of the seven OSI layers, but
you’ll never forget my model!” Why? Because you’ll use it every day!
I once had a reader e-mail me about the Four-Layer Model. She said I
should change its name to Mike’s Four-Doors Model. Her suggestion for the
name change came from the fact that the four layers of my model seemed to
her like doorways to the innards of the network, rather than a true definition
of all network functions. In a way, she was right—my model does not define
all the functions of a network, like the OSI seven-layer model does. I ignore
or blend most of the OSI layers into my model because I want to deal with
things I can touch in the network. So, I guess the doorway analogy is a decent
way to think about my model, but I’m too lazy to change all my work so I’m
sticking to the name Four-Layer Model. Let’s look at each of its layers.
544
Mike Meyers’ Network+ Guide to Managing and Troubleshooting Networks
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 545
Hardware
Hardware is probably the most self-explanatory of the four categories. This Mike’s Four-Layer Model is in
layer covers the many different ways data can be moved from one PC to an- fact nothing more than this one
other, from copper to fiber to wireless signals. It includes the Physical and tech’s opinion of how best to fix
Data Link components of the OSI model, but concentrates on the parts that a network. It is neither an industry
standard nor that well-known—
make this all work, like hubs, cables, and connectors. It also includes items yet. It is not part of the Network+
that the OSI model does not directly address, like NICs, device drivers for test in any way, but it will help
NICs, and how you install and test them. you on the test by providing a
framework you can use to analyze
Protocols the many scenario questions
on the exam and quickly generate
I should call this section “Network Protocols,” but I don’t want you confus- correct answers.
ing it with the next one. Protocols are the languages of networks. As you’ve
learned, these languages have interesting names such as NetBIOS/
NetBEUI, IPX/SPX, and the ever-popular TCP/IP. A protocol is a highly
standardized language that handles most of the “invisible” functions on a
network, like determining which computer is SERVER1, or disassembling
and reassembling data passed over the network. Here we concern ourselves
with installing and configuring the protocol so that a system can communi-
cate with other systems on the network. We’re not too interested in how this
all works in great detail—the point here is that if you install the right
protocol and configure it properly, it will work.
Network
Once you install the hardware and the protocol, you need to make two criti-
cal determinations. First, you need to decide which systems will share re-
sources and which systems will only access those shared resources. In other
words, you must determine which systems will act as servers and which
will act as clients, and then configure them accordingly. Second, you need to
name the systems, so they can see each other, usually something like Server1
or Mike’s PC. In this layer, the concepts of client/server, peer-to-peer, and
domain-based networks come into play. Different network operating sys-
tems use different methods to name their systems and to determine which
systems share and which do not. This layer requires that you appreciate the
differences among programs like Windows, NetWare, and Linux.
Shared Resources
The entire reason we network is to share resources, so this final layer encom-
passes all the steps required to enable a system to share a resource, and to al-
low and enable other systems access to that shared resource. This layer
includes a number of steps, and unlike the earlier layers, these steps often
need to be done fairly frequently, because by their nature, shared resources
and the users who access them change pretty much continuously. This layer
includes most of the day-to-day administration of networks and tends to be
the place we spend the majority of our time.
545
Chapter 20: Zen and the Art of Network Support
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 546
■ Troubleshooting Scenarios
I want to end this chapter and the book with some good troubleshooting sce-
narios. Take some time and think about these situations and how you would
handle them. What questions would you ask? What tests would you do
first? The Network+ exam absolutely loves to ask scenario questions. The
knowledge from the previous chapters combined with the methods you’ve
learned in this chapter should enable you to fix any network!
546
Mike Meyers’ Network+ Guide to Managing and Troubleshooting Networks
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 547
Tech first tries accessing the intranet site from her workstation, and finds she
has no problem. Tina might also want to have other users try to log in, or con-
firm that other users are not having the same problem. Next, Tina should
have Woody try to log in from another machine. This will help Tina deter-
mine whether the problem lies with Woody’s user account’s capability to log
in, or with Woody’s Windows 98 workstation or connectivity.
If Woody is unable to log in from another machine, Tina should proba-
bly check to be sure Woody is using the correct login ID, password, and pro-
cedure when he logs in. On the other hand, if Woody is able to log in from
another user’s workstation, Tina should probably focus on determining
whether Woody’s workstation is working properly and connecting to the
network. One step she could try here is pinging Woody’s workstation. If
Tina is able to ping Woody’s machine successfully, she knows that the ma-
chine is up, the TCP/IP protocol is configured correctly, and the system is
connected to the network. Tina might then check the configuration of the
network client on Woody’s workstation. If Tina is not able to ping the work-
station, however, she might need to test the cables and NIC using cable test-
ers or loopback devices, and verify that TCP/IP was correctly configured
using WINIPCFG.
547
Chapter 20: Zen and the Art of Network Support
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 548
server. This reveals to Tina that the slowdown stems from one of the inter-
mediate steps through which Wanda’s system connects to the server. Be-
cause of this, the problem is out of Tina’s hands, unless she can offer a direct
dial-up option for Wanda.
If Tina finds she cannot reach the offending server quickly when she
tries from her workstation, then the problem may lie with the server itself.
Tina checks the Change Log for the web server, to see if anyone has changed
anything recently. She discovers a new anti-virus component was recently
added, so she checks the vendor’s web site to make sure there are no known
problems or patches for that piece of software. She also uses the Perfor-
mance Monitor to compare the server’s current responses to the baseline
that she previously recorded. This shows her that the bottleneck is related to
excessive paging, indicating that the server may need more physical
memory, or RAM.
Troubleshooting Is Fun!
The art of network troubleshooting can be a fun, frolicsome, and frequently
frustrating feature of your network career. By applying a good trouble-
shooting methodology and constantly increasing your knowledge of net-
works, you too can develop into a great troubleshooting artist. This takes
time, naturally, but stick with it. Begin the training. Use the Force. Learn
new stuff, document problems and fixes, talk to other network techs about
similar problems. Every bit of knowledge and experience you gain will
make things that much easier for you when crunch time comes and a net-
work disaster occurs—and as any experienced network tech can tell you, it
will, even in the most robust network.
548
Mike Meyers’ Network+ Guide to Managing and Troubleshooting Networks
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 549
Chapter 20 Review
■ Chapter Summary
After reading this chapter and completing the establishing just how much data the organization is
exercises, you should understand the following willing to risk versus how much time and storage
about networking. it’s willing to devote to backups.
■ Baselines create a benchmark or standard
Describe troubleshooting tools measurement of when everything is working
■ Network troubleshooting tools can be separated correctly on your network. Consider this to be a
into three categories: software tools, hardware snapshot of your systems. In Windows NT/2000,
tools, and “touchy” tools. The touchy tools include the Performance Monitor (PerfMon) watches
knowing what questions to ask end users, in a Windows NT/2000/XP/2003 machines, either
thoughtful way, regarding their computer locally or remotely. Know the concepts of objects
problems. Hardware tools include cable testers, (like CPU, memory, or disk drives), counters
protocol analyzers, hardware loopback devices, (which do the actual tracking), and views (which
and toners. Software tools include protocol allow real-time or historical arrangements of
analyzers, network analyzers, system logs, collected data). Novell NetWare servers have a
performance monitors, and system management loadable Console Monitor application. Although
software suites. The best “toolbox” to carry with Console Monitor can be viewed on a remote
you at all times is your brain. system, it only runs on the NetWare server. These
are called NetWare Loadable Modules (NLMs),
Explain the troubleshooting process and this particular one is started with the LOAD
■ The troubleshooting process is a dynamic fluid MONITOR command at the server console prompt.
process that requires quick decisions to get the ■ Any troubleshooting model should include the
network going again. Be conservative in your following simple steps: start out by establishing the
approach—protect your network’s data with two symptoms, isolating the cause and scope of the
basics—keep regular backups, and create baselines problem (this includes asking end users the right
for later comparisons. Be aware that each file on kinds of isolating questions), and determining
your systems has an associated archive bit, which what has changed that might have caused the
indicates that a file has changed. Know the problem. Then you can identify the most probable
different type of backups, as well as which backups cause, implement a solution, test the solution, and
clear and which backups set the archive bit on. recognize the potential effects of the solution.
■ A full (or normal) backup copies everything and Wrap things up with proper documentation during
clears the archive bits. A copy backup is a true your troubleshooting—this will help you keep
copy of an earlier backup, and does not affect the track of all that you’ve tried, and also come in
archive bits. An incremental backup (basically, a handy in the future. Those who do not document
copy of all files that have changed since the most now have no right to complain about lack of
recent backup) copies only those files that have the documentation in the past!
archive bit set, and then clears the archive bit on ■ “Mike’s Four-Layer Model” approaches
just those files. A differential backup (capturing troubleshooting as an art form. The four layers
those files that have changed since the last full suggested are hardware, protocols, network, and
backup) is like an incremental backup, except it shared resources. Mike’s hardware layer involves,
doesn’t affect the archive bit. Finally, a daily (or obviously enough, making sure the right hardware
daily copy) backup makes a copy of all the files that is in place, powered on, and connected. Mike’s
have changed that day, and does not change the protocol layer involves making sure configuration
archive bit. Frequency, storage, and type of settings are correct. It’s always best to fully test out
backups performed are major decisions that any changes in equipment to avoid being called
involve careful planning and analysis— back to the scene to finish things off properly.
549
Chapter 20: Zen and the Art of Network Support
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 550
Mike’s network layer involves making sure ■ Another common complaint from end users is that
network devices, especially servers, are server response times are slow. Comparisons
functioning normally. Finally, Mike’s shared against preestablished baselines, mentioned earlier,
resources layer involves checking for adequate will yield clues as to actual versus perceived
permissions/rights and shares on resources to slowdowns. The TRACERT command could also
provide appropriate access to network clients. reveal a slow hop along the data packet’s path.
■ A final problem mentioned by many end users that
Analyze troubleshooting scenarios involves solid troubleshooting is when Network
■ Some of the biggest and most complex Neighborhood/My Network Places does not show
troubleshooting scenarios involve having users other machines—a connectivity issue. Use the
simply log on. Trying to log on from other nearby PING command to ping the loopback address
machines will help to isolate and define the (127.0.0.1 or LocalHost), ping the system’s own IP
problem. Having yourself attempt to log on and try address, ping the default gateway (normally a
the PING command are further steps to help solve router), and then ping a remote machine. The
this situation. Another problem that pops up PING command helps you determine where the
occasionally is when a user cannot get to a certain connection drops off, enabling you to further track
web site. Have the user try to reach another web down the item at fault.
site like www.CompTIA.org and try to ping the ■ Remember as you practice the Art of Network
site as well. You may then be able to determine Troubleshooting to keep it fun, learn all you can,
whether DNS is functioning properly or not. Quite and have an “up” day! Good luck on your
simply it could be their server that is temporarily Network+ exam!
down, too.
■ Key Terms
Archive bit (534) Incremental backup (534) Protocol analyzer (531)
Backups (533) Mike’s Four-Layer Model (533) Software tools (531)
Baselines (533) NetWare Loadable Module System logs (531)
Console monitor (539) (NLM) (540) Touchy tools (529)
Copy backup (534) Network analyzer (531) Troubleshooting model (540)
Counter (537) Network Monitor (NetMon) (531) Troubleshooting process (540)
Daily backup Normal backup (534) Troubleshooting scenarios (530)
(daily copy backup) (534) Object (537) Troubleshooting tools (531)
Differential backup (534) Performance Monitor View (537)
Hardware tools (530) (PerfMon) (537)
550
Mike Meyers’ Network+ Guide to Managing and Troubleshooting Networks
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 551
■ Multiple-Choice Quiz
1. What should be done to establish normal 6. Julie has spent half a day troubleshooting a
operating conditions on your network? network problem and has isolated it to (most
A. Backups likely) configuration or hardware issues on a
single PC. The rest of the network works fine,
B. Baselines but Julie now has a frustrated computer user
C. Remote access who needs her PC networked to get work done.
D. Troubleshooting Which of the following offers Julie the best
chances of getting good information from the
2. Which of the following should you do first when
frustrated user? (Select two.)
troubleshooting a network problem?
A. When did you first notice your problem?
A. Isolate the problem
B. When was it working last?
B. Test the solution
C. Have there been any changes made to the
C. Implement a solution
hardware or configuration recently?
D. Document the solution
D. What have you done, you great oaf?
3. Which of the following would be an appropriate
7. Which of the following items should be done last
place to keep your hardware toolkit? (Select all
when troubleshooting a network problem?
that apply.)
A. Isolate the problem
A. In the server room
B. Test the solution
B. In the trunk of your car
C. Implement a solution
C. At home
D. Document the solution
D. None—you can get by without one
8. Where would DNS problems likely occur?
4. What should you keep in your hardware toolkit?
(Select all that apply.)
(Select all that apply.)
A. DNS server
A. Cable tester
B. Hosts file
B. Crimpers
C. Lmhosts file
C. Spare cable
D. WINS server
D. Games
9. What is required on a UNIX/Linux server when
5. Where could you find a list of problems that
logging on as root?
occurred on a system?
A. Password
A. DNS Server
B. Placename
B. Event Viewer
C. Rootname
C. User Manager
D. User name
D. User Manager for Domains
551
Chapter 20: Zen and the Art of Network Support
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 552
10. What must you have to log onto a Windows 2000 13. Which of the following are levels of “Mike’s
Server system as Administrator? (Select all that Four-Layer Model” to troubleshooting? (Select
apply.) all that apply.)
A. Password A. Hardware
B. Place name B. Protocol
C. Root name C. Network
D. User name D. Shared resources
11. You are called to assist a user who cannot access 14. What item can help isolate a bad NIC that is
any shared files on the network. You open the sending out too much traffic?
NIC’s properties to find that no protocols are A. Bus
installed. What should you do?
B. Hub
A. Format the hard drive
C. Protocol analyzer
B. Reinstall all programs
D. Router
C. Reinstall the operating system
15. Being able to ping a remote system by
D. Reinstall the protocols IP address, but not by FQDN, suggests what
12. Where should backup tapes be kept? type of error?
A. In the server room A. DNS
B. On a shelf in the storeroom B. Routing
C. In a locked cabinet away from the server room C. NetBEUI
D. In the boss’s car trunk D. Routing
■ Essay Quiz
1. Some students in class are discussing when tape 4. After a recent file restore fiasco at the nonprofit
backups should be performed. One student says organization you work at, management decides
daily, during nonpeak hours, while another to eliminate the concept of incremental backups.
student suggests weekly. A third student says You are asked to choose another backup method
both students are correct. The trio suddenly that would not involve restoring so many tapes.
looks at you for your definitive answer. Write Write down which method you would use and
down what you would say. give reasons as well.
2. You are the new network technician at your 5. You are on your way back from a call to
company working the Monday morning shift for unlock an end user’s account by resetting their
the first time. An end user calls in saying server password. On entering the server room you
response times are slow. Write down what you notice it feels a little warm. Then you notice that
should say to the end user, as well as what you a colleague has mistakenly left a soda on top
would do. of one of the servers. Which item should you
3. The IT group at your company has been told to tend to first—and why? Which item would
do nightly backups as quickly as possible. you address second—and why? Which item
Backup tapes are the backup method of choice. did you leave for last—and why? Document
Jot down the thoughts you would contribute to your findings and be prepared to share your
the discussion. thoughts with your class.
552
Mike Meyers’ Network+ Guide to Managing and Troubleshooting Networks
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 553
Lab Projects
• Lab Project 20.1
Use the Internet to find Network+ practice
questions. Try to locate as many troubleshooting
scenario questions in the time allowed. Share
your findings with classmates who have done the
same. The more practice questions you cover as
a group, the better prepared you will be handling
real questions on the Network+ exam.
Item: Cost
Model Web Site (Include S & H)
Cable tester:
$
Hardware loopback device:
$
Protocol analyzer:
$
Toner:
$
553
Chapter 20: Zen and the Art of Network Support
ch20p26.prn
P:\010Comp\BasTch2C\560-9\ch20.vp
Wednesday, June 30, 2004 12:59:08 PM
BaseTech / Network+® Guide to Managing & Troubleshooting Networks / Meyers / 225560-9 / Blind Folio 554