Introduction to Computer Networks Introduction to Computer Networks.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Lesson 22. Networking Tools. Objective At the end of this Presentation, you will be able to:
Section 14.1 Section 14.2 Identify troubleshooting steps
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Introduction to Network Analysis and Sniffer Pro
(part 4).  Gateways  A gateway is responsible for translating information from one format to another and can run at any layer of the OSI model, depending.
Chapter 19: Network Management Business Data Communications, 4e.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Chapter 15 Chapter 15: Network Monitoring and Tuning.
Network+ Guide to Networks, Fourth Edition
Open System Interconnection (OSI) Model
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Chapter 12: Troubleshooting Networking Problems Network+ Guide to Networks Third Edition.
11 MONITORING MICROSOFT WINDOWS SERVER 2003 Chapter 3.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 14 Server and Network Monitoring.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
© 2001 by Prentice Hall1-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 12 LAN Administration: Reactive.
Click to edit Master subtitle style Chapter 18: Software and Hardware Tools Instructor:
Connecting LANs, Backbone Networks, and Virtual LANs
Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Software and Hardware Tools COMP 316. Software Tools.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Hands-on Networking Fundamentals
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Common Devices Used In Computer Networks
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
Chapter 6 – Connectivity Devices
25-Oct-15Network Layer Connecting Devices Networks do not normally operate in isolation.They are connected to one another using connecting devices. The.
PRESENTATION ON:- INTER NETWORK Guided by: Presented by:- Prof. Ekta Agrwal Dhananjay Mishra Prafull Jain Vinod Kumawat.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
An Introduction to Networking
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
Introduction to Computer Networks Introduction to Computer Networks.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network Troubleshooting
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Protocol Layering Chapter 11.
Local Area Networks Honolulu Community College
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Introduction to Computer Networks Introduction to Computer Networks.
The Difference Between Router and Switch Not everyone knows: ADVANTAGES OF SWITCH:  Switches offer higher performance than bridges and hubs.  Switches.
NETWORK DEVICES Department of CE/IT.
Lec4: Troubleshooting Network Problems Network+ Guide to Networks 5 th Edition Chapter 13 Troubleshooting Network Problems Organized by: Nada Alhirabi.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Click to edit Master subtitle style Chapter 18: Software and Hardware Tools.
Network Traffic Monitoring and Analysis - Shisheer Teli CCCF.
CompTIA Network+ N Authorized Cert Guide
Instructor Materials Chapter 8: Network Troubleshooting
Local Area Networks Honolulu Community College
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Connecting Networks Repeater: physical layer Bridge: data link layer
Chapter 15: Network Monitoring and Tuning
Module 4: Packet analysis
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Introduction to Computer Networks Introduction to Computer Networks

Troubleshooting Tools Troubleshooting network problems is often accomplished with the help of hardware and software. To troubleshoot effectively, you need to know how these tools can be used to solve network problems.

Hardware Tools Digital Voltmeters: is the primary all-purpose electronic measuring tool.Digital Voltmeters: is the primary all-purpose electronic measuring tool. Voltmeters can determine if:Voltmeters can determine if: The cable is continuous (has no breaks).The cable is continuous (has no breaks). The cable can carry network traffic.The cable can carry network traffic. Two parts of the same cable are exposed and touching (thereby causing shorts).Two parts of the same cable are exposed and touching (thereby causing shorts). An exposed part of the cable is touching another conductor, such as a metal surface.An exposed part of the cable is touching another conductor, such as a metal surface.

Time-Domain Reflectometers (TDRs) TDRs send sonar-like pulses along cables to locate breaks, shorts, or imperfections.TDRs send sonar-like pulses along cables to locate breaks, shorts, or imperfections. A TDR can locate a break within a few feet of the actual separation in the cable.A TDR can locate a break within a few feet of the actual separation in the cable. Used heavily during the installation of a new network, TDRs are also invaluable in troubleshooting and maintaining existing networks.Used heavily during the installation of a new network, TDRs are also invaluable in troubleshooting and maintaining existing networks.

Advanced Cable Testers Advanced cable testers work beyond the physical layer of the OSI reference model, in the data-link layer, network layer, and even the transport layer.Advanced cable testers work beyond the physical layer of the OSI reference model, in the data-link layer, network layer, and even the transport layer. They can also display information about the condition of the physical cable. They can also display information about the condition of the physical cable.

Oscilloscopes Oscilloscopes are electronic instruments that measure the amount of signal voltage per unit of time and display the result on a monitor.Oscilloscopes are electronic instruments that measure the amount of signal voltage per unit of time and display the result on a monitor. When used with TDRs, an oscilloscope can display:When used with TDRs, an oscilloscope can display: Shorts. Sharp bends or crimps in the cable. Opens (breaks in the cable). Attenuation (loss of signal power).Shorts. Sharp bends or crimps in the cable. Opens (breaks in the cable). Attenuation (loss of signal power).

Other Hardware Tools Crossover Cables: are used to connect two computers directly with a single patch cable.Crossover Cables: are used to connect two computers directly with a single patch cable. Crossover cables are useful in troubleshooting network connection problems. Two computers can be directly connected, bypassing the network and making it possible to isolate and test the communication capabilities of one computer, rather than the whole network.Crossover cables are useful in troubleshooting network connection problems. Two computers can be directly connected, bypassing the network and making it possible to isolate and test the communication capabilities of one computer, rather than the whole network. Hardware Loopback: is a serial port connector that enables you to test the communication capabilities of a computer's serial port without having to connect to another computer or peripheral device.Hardware Loopback: is a serial port connector that enables you to test the communication capabilities of a computer's serial port without having to connect to another computer or peripheral device.

Tone Generator and Tone Locator Tone generators are standard tools for wiring technicians in all fields.Tone generators are standard tools for wiring technicians in all fields. A tone generator is used to apply an alternating or continuous tone signal to a cable or a conductor.A tone generator is used to apply an alternating or continuous tone signal to a cable or a conductor. The tone generator is attached to one end of the cable in question.The tone generator is attached to one end of the cable in question. A matching tone locator is used to detect the correct cable at the other end of the run.A matching tone locator is used to detect the correct cable at the other end of the run. These tools are also able to test for wiring continuity and line polarity.These tools are also able to test for wiring continuity and line polarity.

Software Tools Software tools are needed to monitor trends and identify network performance problems.Software tools are needed to monitor trends and identify network performance problems. Network MonitorsNetwork Monitors Network monitors are software tools that track all or a selected part of network traffic.Network monitors are software tools that track all or a selected part of network traffic. They examine data packets and gather information about packet types, errors, and packet traffic to and from each computer.They examine data packets and gather information about packet types, errors, and packet traffic to and from each computer. Network monitors are very useful for establishing part of the network baseline.Network monitors are very useful for establishing part of the network baseline.

Protocol Analyzers (1) also called "network analyzers," perform real-time network traffic analysis using packet capture, decoding, and transmission data.also called "network analyzers," perform real-time network traffic analysis using packet capture, decoding, and transmission data. Protocol analyzers look inside the packet to identify a problem.Protocol analyzers look inside the packet to identify a problem. They can also generate statistics based on network traffic to help create a picture of the network, including the:They can also generate statistics based on network traffic to help create a picture of the network, including the: Cabling. Software. File servers. Workstations. Network interface cards.Cabling. Software. File servers. Workstations. Network interface cards.

Protocol Analyzers (2) Protocol analyzers have built-in TDRsProtocol analyzers have built-in TDRs The protocol analyzer can provide insights and detect network problems including:The protocol analyzer can provide insights and detect network problems including: Faulty network components. Configuration or connection errors. LAN bottlenecks. Traffic fluctuations. Protocol problems. Applications that might conflict. Unusual server traffic.Faulty network components. Configuration or connection errors. LAN bottlenecks. Traffic fluctuations. Protocol problems. Applications that might conflict. Unusual server traffic.

Protocol Analyzers (3) Protocol analyzers can identify a wide range of network behavior. They can:Protocol analyzers can identify a wide range of network behavior. They can: Identify the most active computers.Identify the most active computers. Identify computers that are sending error-filled packets. If one computer's heavy traffic is slowing down the network, the computer should be moved to another network segment. If a computer is generating bad packets, it should be removed and repaired.Identify computers that are sending error-filled packets. If one computer's heavy traffic is slowing down the network, the computer should be moved to another network segment. If a computer is generating bad packets, it should be removed and repaired.

Protocol Analyzers (4) View and filter certain types of packets. This is helpful for routing traffic. Protocol analyzers can determine what type of traffic is passing across a given network segment.View and filter certain types of packets. This is helpful for routing traffic. Protocol analyzers can determine what type of traffic is passing across a given network segment. Track network performance to identify trends. Recognizing trends can help an administrator better plan and configure the network.Track network performance to identify trends. Recognizing trends can help an administrator better plan and configure the network. Check components, connections, and cabling by generating test packets and tracking the results.Check components, connections, and cabling by generating test packets and tracking the results. Identify problem conditions by setting parameters to generate alerts.Identify problem conditions by setting parameters to generate alerts.

Network General Sniffer Sniffer, which is part of a family of analyzers from Network General, can decode and interpret frames from 14 protocols.Sniffer, which is part of a family of analyzers from Network General, can decode and interpret frames from 14 protocols. Sniffer measures network traffic in kilobytes per second, frames per second, or as a percentage of available bandwidth.Sniffer measures network traffic in kilobytes per second, frames per second, or as a percentage of available bandwidth. It will gather LAN traffic statistics, detect faults such as beaconing, and present this information in a profile of the LAN.It will gather LAN traffic statistics, detect faults such as beaconing, and present this information in a profile of the LAN. Sniffer can also identify bottlenecks by capturing frames between computers and displaying the results.Sniffer can also identify bottlenecks by capturing frames between computers and displaying the results.

Monitoring and Troubleshooting Tools Performance Monitors:Performance Monitors: Most current network operating systems include a monitoring utility that will help a network administrator keep track of a network's server performance.Most current network operating systems include a monitoring utility that will help a network administrator keep track of a network's server performance. These monitors can view operations in both real time and recorded time for:These monitors can view operations in both real time and recorded time for: Processors. Hard disks. Memory. Network utilization. The network as a whole.Processors. Hard disks. Memory. Network utilization. The network as a whole.

Performance Monitors: These monitors can:These monitors can: Record the performance data.Record the performance data. Send an alert to the network manager.Send an alert to the network manager. Start another program that can adjust the system back into acceptable ranges.Start another program that can adjust the system back into acceptable ranges. When monitoring a network, it is important to establish a baseline,When monitoring a network, it is important to establish a baseline,

Network Monitors Some servers include network monitoring software.Some servers include network monitoring software. This tool gives the administrator the ability to capture and analyze network data streams to and from the server. This tool gives the administrator the ability to capture and analyze network data streams to and from the server. This data is used to troubleshoot potential network problems.This data is used to troubleshoot potential network problems. The packets of data in the data stream consist of the following information: (1)The source and destination address (2)Headers (3)dataThe packets of data in the data stream consist of the following information: (1)The source and destination address (2)Headers (3)data

Simple Network Management Protocol (SNMP) In an SNMP environment, programs called "agents" are loaded onto each managed device. The agents monitor network traffic in order to gather statistical data. This data is stored in a management information base (MIB). In an SNMP environment, programs called "agents" are loaded onto each managed device. The agents monitor network traffic in order to gather statistical data. This data is stored in a management information base (MIB). If any of the data falls above or below thresholds, the management program can notify the administrator If any of the data falls above or below thresholds, the management program can notify the administrator