1 / 39

Chapter Twelve

2. Troubleshooting Methodology. Proceed w/ Logic and think of L1-L7Do not discount the obvious!Steps to troubleshooting network problemsIdentify the symptomsVerify user competencyIdentify the scope of the problemRecreate the problemVerify the physical integrity of the network connection, star

amarante
Download Presentation

Chapter Twelve

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. 1 Chapter Twelve Troubleshooting Network Problems

    2. 2 Troubleshooting Methodology Proceed w/ Logic and think of L1-L7 Do not discount the obvious! Steps to troubleshooting network problems Identify the symptoms Verify user competency Identify the scope of the problem Recreate the problem Verify the physical integrity of the network connection, starting at the affected nodes and moving outward toward the backbone

    3. 3 Troubleshooting Methodology Steps to troubleshooting network problems (cont.) Verify the logical integrity of the network connection Consider recent changes to the network and how those changes might have caused a problem Implement a solution Test the solution

    4. 4 Troubleshooting Methodology Verify user competency Ensure that human error is not the problem Be patient – do a step by step analysis Identify the scope of the problem How many users or network segments are affected? When did the problem begin? VERY important stage

    5. 5 Practical Troubleshooting Staff involved in trouble shooting Help desk staffed with help analysts Organizations may group their help desk analysts into teams based on their expertise Most help desks have a help desk coordinator Most organizations have an operations manager, who supervises the help desk coordinator

    6. 6 Examples of Problems Faced by Network Troubleshooters Unable to access the network One of the most common problems addresses is an inability to access the network Misbehaving printer Network printers cause as many problems as network workstations (though they are usually less critical than servers) Unable to connect to the Internet An inability to connect to the Internet can quickly hamper productivity and could perhaps affect the organization’s profitability

    7. 7 Troubleshooting Follow-Up Document problems and solutions Call tracking system Software program for documenting problems Informally known as help desk software Building a knowledgebase

    8. 8 Troubleshooting Follow-Up Important Fields for a Typical Problem Record Form The originator’s name, department, and phone number Information regarding whether the problem is software- or hardware-related If the problem is software-related, the package to which it pertains, or if hardware related, the devices or components to which it pertains Symptoms of the problem, including when it was first noticed

    9. 9 Troubleshooting Follow-Up Important Fields for a Typical Problem Record Form (cont.) Name and telephone number of the network support contact Amount of time spent troubleshooting the problem Resolution of the problem Supported services list Lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages

    10. 10 Chapter Thirteen Ensuring Integrity and Availability

    11. 11 Fault Tolerance Capacity for a system to continue performing despite an unexpected hardware or software malfunction Failure Deviation from a specified level of system performance for a given period of time Fault Involves the malfunction of one component of a system

    12. 12 Fault Tolerance Fail-over Process of one component immediately assuming the duties of an identical component A sophisticated means for dynamically replicating data over several physical hard drives is known as hard disk redundancy, called RAID (for Redundant Array of Inexpensive Disks) Single point of failure Point on a network where, if a fault occurs, the transfer of data may break down without possibility of an automatic recovery

    13. 13 Environment and Power Environment Analyze the physical environments in which your devices operate Power Whatever the cause, networks cannot tolerate power loss or less than optimal power

    14. 14 Power Flaws Surge – momentary increase in voltage Line noise – EMF interference Brownout Also known as a sag Blackout – complete power loss

    15. 15 Uninterruptible Power Supply (UPS) Battery-operated power source directly attached to one or more devices and to a power supply Standby UPS Switches instantaneously to the battery when it detects a loss of power from the wall outlet

    16. 16 Factors in Choosing a UPS Amount of power needed A volt-amp (VA) is the product of the voltage and current of the electricity on a line Period of time to keep a device running Line conditioning Cost

    17. 17 Connectivity Hot swappable Identical components that automatically assume the functions of their counterpart if one suffers a fault

    18. 18 Topology Load balancing Automatic distribution of traffic over multiple links or processors to optimize response

    19. 19 Servers Redundant Array of Inexpensive Disks (RAID) A group of hard disks is called a disk array

    20. 20 RAID Level 0—Disk Stripping Simple implementation of RAID in which data are written in 64 KB blocks equally across all disks in the array

    21. 21 RAID Level 1—Disk Mirroring Data from one disk are copied to another disk automatically as the information is written

    22. 22 RAID Level 5—Disk Stripping with Distributed Parity Data are written in small blocks across several disks

    23. 23 Server Mirroring and Server Clustering Server mirroring Fault tolerance technique in which one server duplicates the transactions and data storage of another Server clustering Fault tolerance technique that links multiple servers together to act as a single server

    24. 24 Data Backup Copy of data or program files created for archiving purposes Vault Tape storage library

    25. 25 Online Backups and Backup Strategy Online backups Done over the Internet Questions to ask in developing a backup strategy What kind of rotation schedule will backups follow? At what time of day or night will the backups occur? How will you verify the accuracy of the backups?

    26. 26 Backup Strategy Questions to ask in developing a backup strategy (cont.) Where will backup media be stored? Who will take responsibility for ensuring that backups occurred? How long will you save backups? Where will backup and recovery documentation be stored?

    27. 27 Backup Strategy Methods Full backup All data on all servers are copied to a storage medium Incremental backup Only data that have changed since the last backup are copied to a storage medium Differential backup Only data that have changed since the last backup are copied to a storage medium, and that information is then marked for subsequent backup

    28. 28 Backup Rotation Scheme Specifies when and how often backups will occur

    29. 29 Chapter Fourteen Network Security

    30. 30 Security Audits Assessment of an organization’s security risks Should be performed at least annually and preferably quarterly What to check?

    31. 31 Security Risks Social engineering Manipulating relationships to circumvent network security measures and gain access to a system Some risks associated with people Intruders or attackers using social engineering or snooping to obtain passwords An administrator incorrectly creating or configuring user IDs, groups, and their associated rights on a file server

    32. 32 Security Risks Some risks associated with people (cont.) Network administrators overlooking security flaws in topology or hardware configuration Network administrators overlooking security flaws in operating system or application configuration Lack of proper documentation and communication of security policies Dishonest or disgruntled employees abusing their file and access rights An unusual computer or terminal being left logged into the network

    33. 33 Security Risks Some risks associated with people (cont.) Users or administration choosing easy-to-guess passwords Authorized staff leaving computer room doors open or unlocked Staff discarding disks or backup tapes in public waste containers Administrators neglecting to remove access files and rights for former employees

    34. 34 Risks Associated with Hardware and Network Design Inherent risks in network hardware and design Wireless transmission can typically be intercepted Networks that use leased lines are vulnerable to eavesdropping Repeater hubs broadcast traffic over the entire segment If they are not disabled, unused hubs, routers, or server ports can be exploited and accessed by crackers

    35. 35 Risks Associated with Hardware and Network Design Inherent risks in network hardware and design (cont.) If routers are not properly configured to mask internal subnets, users on outside networks can read the private addresses Modems attached to network devices may be configured to accept incoming calls Dial-in access servers used by telecommuting or remote staff may not be carefully secured and monitored Computers hosting very sensitive data may coexist on the same subnet with computers open to the general public

    36. 36 Addressing Risks Associated with People An effective security policy Typical goals for security policies Ensuring that authorized users have appropriate access to the resources they need Preventing unauthorized users from gaining access to the network, systems, programs, or data Protecting sensitive data from unauthorized access

    37. 37 An Effective Security Policy Typical goals for security policies (cont.) Preventing accidental damage to hardware or software Preventing intentional damage to hardware or software Creating an environment where the network and systems can withstand and quickly recover from any type of threat Communicating each employee’s responsibilities with respect to maintaining data integrity

    38. 38 Passwords Tips for making and keeping passwords secure Do not use the familiar types of passwords Do not use any word that might appear in a dictionary Make passwords longer than six characters

    39. 39 Passwords Tips for making and keeping passwords secure (cont.) Choose a combination of letters and numbers Do not write down your password or share it with others Change your password at least every 90 days

More Related