intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Network+ Certification (Outline) - Chapter 18: Network troubleshooting tools

Chia sẻ: Bbbbbb Bbbbbb | Ngày: | Loại File: PDF | Số trang:26

42
lượt xem
3
download
 
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

This chapter includes contents: Documentation and resources, logs and indicators, network testing and monitoring tools, product documentation, CD-ROM documentation formats,...

Chủ đề:
Lưu

Nội dung Text: Network+ Certification (Outline) - Chapter 18: Network troubleshooting tools

  1. Chapter 18, Network Troubleshooting Tools |1| Chapter Overview A. Documentation and Resources B. Logs and Indicators C. Network Testing and Monitoring Tools Chapter 18, Lesson 1 Documentation and Resources 1. Introduction A. Many people who work with computers and networks do not read the documentation that comes with the products they use. B. To cut costs, most hardware and software manufacturers have greatly reduced the amount of printed documentation they include with products. C. To properly administer and troubleshoot a network, you must have information about the products you are using. 1. In many cases, you must turn to resources other than the product manufacturer to get information. 2. Many other sources of information are now available to the network administrator. |2| 2. Product Documentation A. Hardware and software products usually do not come with thick volumes of printed manuals as they used to, but documentation is usually included in some form. B. Even if you do not need to read the manual to install or configure the product, you should always keep all the documentation. 1. Although you may be very familiar with the devices or software products you use, you might still need the documentation some day. a. Example: suppose you need to install additional memory in all the computers on an existing network. (1) You might not know what type of memory modules you need, what combinations of modules the computers support, or how much memory they can use. (2) Suppose that the company that manufactured those computers no longer makes or supports the model you are using. (a) If you have kept the documentation, you can probably find the information you need. (b) If you do not have the documentation, you will have to determine by trial and error what memory configurations the computers can use, which could waste a lot of time and money. |3| C. CD-ROMs can contain documents in various formats, such as the following:
  2. 1. Text files a. Many manufacturers use plain ASCII text files to provide late- breaking information about product problems, revisions, and compatibility issues. b. The traditional name for this type of text file is README.1ST or something similar. c. Check the software distribution CD-ROMs that accompany the product for README text files or files with a .txt extension. d. To view text files, you can (1) Use a simple program like NOTEPAD.EXE (included with all current versions of Microsoft Windows) (2) Copy the files to a printer by typing a command such as copy readme.1st lpt1 at the MS-DOS command prompt 2. Hypertext Markup Language Files a. Some manufacturers create documentation in Hypertext Markup Language (HTML) format and include it with the product on a CD-ROM. b. Once you have pointed your browser to the home page file on the disk, viewing the documents on the CD-ROM is the same as viewing them on a Web site. c. Depending on how the HTML files are organized, searching them might or might not be possible. 3. Adobe Acrobat Portable Document Format files a. Acrobat creates and displays documents in a proprietary format called the Portable Document Format (PDF), identified by the .pdf file extension. b. The .pdf files preserve all the original design elements, layout, and formatting characteristics of the original documents, including fonts and full-color illustrations. |4| (1) Acrobat Reader displays the documents in fully laid-out pages, just as they would appear when printed. c. A .pdf file is created by using a special printer driver supplied with Acrobat, which takes the document that was created in another application and compiles it into a single .pdf file. d. You can print a .pdf document to create a printed manual. e. Acrobat is an easy and attractive solution for manufacturers seeking to reduce their publishing costs. f. Despite being a proprietary format, .pdf has become a de facto publishing standard in the computing industry. g. To view a .pdf file, you must have Acrobat Reader, which is available free of charge from the Adobe Web site at http://www.adobe.com/products/acrobat/readstep2.html. (1) Some Acrobat versions can support more than a dozen different hardware platforms. (2) Adobe allows third parties to include Acrobat Reader on their own CD-ROMs, so that if a product includes documentation in 2 Outline, Chapter 18 Network+ Certification, Second Edition
  3. .pdf format and you do not already have Acrobat Reader, you can usually install it from the CD-ROM. h. Acrobat Reader also includes a plug-in for your Web browser so that you can click links to .pdf files on Web sites and display them. (1) When a .pdf file is created specifically for Web access, the Web browser plug-in can display a document as it is downloading, one page at a time, so that you do not have to wait for the entire file to download before any of it is displayed. i. The .pdf files can be quite large, making them better suited for CD-ROM distribution than Web distribution. j. The .pdf files are searchable. (1) Publishers can create an index of key terms in a collection of .pdf files, which speeds up the searching process. |5| 3. Telephone Support A. Virtually every hardware and software company at one time maintained a free technical support telephone line. B. Today, free telephone support is a thing of the past. 1. The costs of hiring, training, and maintaining an effective technical support staff have risen so high that manufacturers have had to limit support or charge a fee for it. 2. Some products include free technical support for a limited time or a limited number of incidents before the manufacturer begins charging a fee. a. The fee can be based on an hourly rate or a per-incident charge, but it usually is not cheap. C. Calling for technical support can be a significant expense, so determining when to call for help is more difficult than it used to be. 1. When support was free, many users called frequently about problems they could easily have solved themselves, simply to avoid the bother of reading the manual. 2. Today, people are more likely to find other sources of support before paying for help. 3. At times, calling for technical support is necessary. a. For example, some manufacturers might have recently discovered product problems or issues that have not yet been documented in print, on their Web site, or even in their Readme files. (1) You could spend hours attempting to research a problem when the whole issue could be solved with a 5-minute telephone call. 4. In general, you should look for help on the Web and Usenet first, and call technical support only as a last resort. 4. Online Resources A. The Internet is the most valuable source of information about computer networking and network products. B. Most manufacturers maintain Web sites that provide extremely valuable information. Outline, Chapter 18 3 Network+ Certification, Second Edition
  4. |6| C. Resources commonly found on manufacturers’ Web sites 1. Marketing collateral a. More useful for presales product evaluation than for technical support b. Includes datasheets, features and benefits lists, product comparisons, product reviews (at least the favorable ones), and other sales literature c. Most often in .pdf format, although it might also be in HTML 2. Product manuals a. An online version can be more valuable if the site has a search engine that lets you find the information you need more easily. 3. Technical documents a. Often provide technical background information that can help you evaluate networking products, understand how they work, and troubleshoot them b. Often posted in .pdf format c. Frequently more concerned with the theoretical aspects of the product than with day-to-day operations 4. Frequently asked questions (FAQs) a. One of the best resources for information about common problems (1) When enough people report the same problem to the manufacturer, the company often addresses the problem by adding it to a list of FAQs, hoping to avoid repetitive support calls. b. The FAQ list should be one of the first resources that you turn to for help. c. Can be an excellent product evaluation resource (1) Finding out what kind of problems a product has and how the manufacturer deals with them can help you decide whether a product is worth purchasing. 5. Technical support databases a. Typically let you search for keywords or error messages b. Provide information on solutions and links to software patches c. The amount of information available depends on the simplicity or complexity of the product. (1) Example: Microsoft’s Knowledge Base (available at http://support.microsoft.com/) contains thousands of articles about the company’s products. (a) You can search by keyword, article ID number, or file name. (b) The Microsoft Knowledge Base, like many other sites, also supports plain language queries, which let you search for information online just as you would ask a person for it. |7| 6. File downloads 4 Outline, Chapter 18 Network+ Certification, Second Edition
  5. a. Being able to download drivers, software updates, patches, and other files is a major benefit of using a manufacturer’s Web site instead of its technical support telephone line. b. Checking to see how many patches have been issued for a product is a good way of evaluating the product before buying it. (1) If a software product has had a large number of bug fixes in a short time, it is probably a good idea to look elsewhere. c. Downloadable files on Web sites are typically supplied as compressed ZIP archives that either are self-extracting or require a decompression program like PKUNZIP or WinZip. (1) UNIX downloads are usually supplied in gzip format. 7. Online messaging a. Online messaging is the Web equivalent of the old bulletin board systems, where you leave a text message and receive a reply from a technical support representative. b. You might find that a solution to your problem has already been posted in a response to another user, or you might find helpful information from other users or the company’s representatives. c. One way of checking the value of online messaging is to see how long it takes for the company to respond to questions from users. (1) If the company takes several days to reply to users’ questions, or if the replies sometimes are not helpful, you should probably look elsewhere for support. 8. Live support a. A few companies offer live sales information or technical support over the Web. (1) Usually a chat application that provides a live text-messaging link between users and company representatives (2) Usually offered during limited hours b. Test the interface carefully on your computer before relying on it as a primary technical support medium. c. In some cases, communication difficulties make this type of support impractical. 9. Manufacturer’s contact information on Web sites a. Includes e-mail addresses and telephone numbers for technical support b. Might include other contact information, such as mailing addresses and procedures for returning defective products D. Third-party Web sites 1. Many other Web sites, in addition to those run by product manufacturers, contain useful networking information. a. Many independent sites are devoted to each of the popular operating systems, major applications, computer hardware, and networking principles. 2. When dealing with information from what is essentially an unknown source, you must be careful to verify anything that seems unlikely or potentially dangerous. Outline, Chapter 18 5 Network+ Certification, Second Edition
  6. a. You can sometimes tell from examining the site whether the information there can be trusted, but the Web has a way of making even the most egregious misinformation seem convincing. |8| E. Usenet 1. A worldwide, text-based Internet bulletin board system that consists of tens of thousands of newsgroups devoted to many topics 2. Not as user-friendly as the Web but provides an enormous amount of valuable technical information 3. To access Usenet newsgroups, you must have a client program called a newsreader and access to a news server. a. The clients and servers communicate with each other by using a specialized Transmission Control Protocol/Internet Protocol (TCP/IP) protocol called the Network News Transfer Protocol (NNTP). b. Newsreaders can be stand-alone programs or they can be incorporated into other applications, such as the Outlook Express client included with Microsoft Internet Explorer. c. Most Internet service providers (ISPs) include access to a news server as part of a standard Internet access subscription. (1) The quality of service varies greatly from ISP to ISP. 4. Usenet newsgroups generate several gigabytes of information every day, and news servers can keep only a limited amount of information available. a. A news server might be able to keep only a few days’ worth of messages available at a time. b. Some servers have incomplete news feeds, which means you will not see all the messages that have been posted to a particular group. (1) This can be a problem, because you might not see all the responses to your questions. 5. For more complete and comprehensive Usenet access, you can subscribe to any one of several commercial news services for a small monthly fee. a. These services guarantee full access to all Usenet newsgroups and usually retain messages for a longer time. |9| 6. To access Usenet, configure your newsreader with the name or Internet Protocol (IP) address of a news server and download a list of the newsgroups. a. The list is alphabetical. b. Newsgroup names consist of several cryptic abbreviations separated by periods, such as comp.infosystems.www.authoring.html. c. You can usually work out the subject of a newsgroup from its name, but some names are in languages other than English. d. As you become accustomed to Usenet jargon, you will learn where to find the newsgroups that deal with a particular subject. 7. A large number of newsgroups are devoted to technical computing issues. a. Examples (1) Newsgroups that deal with individual networking protocols, operating systems, programming languages, and many other related topics 6 Outline, Chapter 18 Network+ Certification, Second Edition
  7. (2) There are hundreds of newsgroups beginning with the word “comp,” which are all computer-related. 8. Usenet is primarily a text-based service, and “netiquette” dictates that you post only text messages on most newsgroups. a. Many news server administrators try to conserve storage space by maintaining only the text-only newsgroups. b. Newsgroups that have the word “binaries” in their name permit the posting of binary files, such as program and image files. 9. The newsreader lets you subscribe to a newsgroup that you want to access. a. Subscribing means only that the newsreader adds the selected newsgroup to the list of groups that you want to access regularly. |10| b. When you access your list of newsgroups, the newsreader downloads the message headers for each group you have subscribed to. c. Message headers contain the subject of each message, the name of the person who posted it, and the date and time it was posted. d. Newsreaders typically can display the headers in several different ways: chronologically; alphabetically by subject or author; by size; or by thread. (1) A thread is a series of messages with the same subject. (2) One person posts a message containing a question or comment, and other people reply to that message. 10. Downloading text-only messages is usually rapid, but downloading messages that contain binary files can take quite a while, depending on the size of the files. |11| a. When the download is complete, you can select a message, and the newsreader displays the text. b. You can compose a reply and send it to the newsgroup or send an e-mail directly to the author. c. If you send the message to the newsgroup, it goes to your news server, which eventually uploads it to other servers. 11. It is more difficult to separate useful from useless information in Usenet than it is on the Web because anyone can participate on Usenet. a. What used to be a medium frequented primarily by technical people has been invaded by many other types of users. b. Unwanted mass postings or off-topic material (“spam”) is a major problem on Usenet, as it is with e-mail. c. Some newsgroups are moderated to keep out the spam, and some news server administrators run software that filters out much of it. 5. CD-ROM Resources A. The CD-ROM products released by several major manufacturers are another good source of information about computer and networking products. 1. Sometimes the disks are free, but in most cases you must purchase a subscription for CD-ROM releases that come out monthly or quarterly. Outline, Chapter 18 7 Network+ Certification, Second Edition
  8. |12| B. Microsoft’s TechNet is one of the most popular CD-ROM subscription products. 1. Each month, you get several CD-ROMs with information about all Microsoft products. 2. The discs include a. Documentation such as the manuals and Resource Kits for Microsoft products, marketing collateral, the complete Knowledge Base, audio and video training materials, and hundreds of other articles and book excerpts b. Data discs that have the latest service packs, patches, and evaluation copies of new products 3. Includes its own searchable viewer application, which makes it easy to locate the information you need C. MSDN is a subscription-based CD-ROM service intended for software and hardware developers. 1. The discs include an enormous amount of information, including a. Software developer’s kits (SDKs) and driver developer’s kits (DDKs) for all Microsoft products b. Copies of all the operating systems c. A developer Knowledge Base 2. There are three subscription levels with different prices and different levels of access. |13| 6. Books and Periodicals A. Many books are available on networking and computer-related topics. 1. Cover a fairly limited range of specific networking products 2. Cover major products, such as operating systems, in depth 3. Excellent resource for background information and networking theory B. Many books include a searchable electronic version on a CD-ROM. 1. Makes the book more portable 2. Lets you search for information quickly and efficiently C. Magazines and trade newspapers are good places to look for current technical information and industry news. 1. Keep in mind that information in a typical monthly magazine is written at least three to four months before you see the issue. 2. Weeklies usually provide more timely information. 3. Many weekly trade newspapers are now available online. Chapter 18, Lesson 2 Logs and Indicators 1. Introduction A. One of the most important responsibilities in maintaining a network is knowing when something is wrong. 8 Outline, Chapter 18 Network+ Certification, Second Edition
  9. 1. Networks perform many important processes automatically and in the background, and you must make sure that what is supposed to have been done has been done, without error and without problems. 2. Power and Drive Lights A. One of the most basic signs that something is wrong on your network is when the equipment operation lights are not lit. 1. Possible causes include a. Power failure b. A tripped circuit breaker c. A disconnected electrical plug d. A power supply failure e. A drive failure or a disconnection inside the computer B. You should become familiar with the light-emitting diode (LED) displays of your equipment during normal operation so that you can quickly determine when something is wrong. |14| 3. Link Pulse Lights |15| A. Most Ethernet network interface adapters that use unshielded twisted- pair (UTP) cable have an LED that is lit when the adapter is connected to a functioning hub. |16| B. The hub usually has an LED for each port as well, that indicates from either end of the patch cable whether the devices are connected. C. These link pulse lights can tell you whether a computer is wired to the hub properly. 1. When you connect a UTP network interface adapter to a hub, the link pulse lights on both devices should be lit, as long as both are switched on. 2. The network interface adapter must be installed in the computer and the computer must be turned on. a. However, the network adapter driver does not need to be installed, and you do not need to be logged on to the network to activate the LED. D. When an Ethernet adapter and a hub are properly connected, they exchange signals to test the connection. |17| 1. On 10Base-T and 10Base-FL equipment, the signal is called a normal link pulse (NLP). a. The NLP signals (1) Last for 2 milliseconds (2) Repeat at intervals of 16.8 milliseconds (3) Occur only when the network is not busy transmitting data, so they do not interfere with normal operations 2. When the LEDs at both ends of the connection are lit, the NLP signals generated by each device are reaching the other device. a. If you accidentally use a crossover cable to connect a computer to a hub, the signals sent over the transmit wires do not reach the receive contacts in the other device, and the LEDs will not light. Outline, Chapter 18 9 Network+ Certification, Second Edition
  10. b. If you connect two network interface adapters together using a straight-through cable and no hub, the LEDs will not light. c. If the LED lights on one device, but not on the other, there is a fault in the cable connection. (1) The cable itself might be faulty, one of the devices’ connectors might be broken, or the cable might not be properly seated into the jack at one or both ends. (2) Try reseating the cable connectors into the jacks, or replace the cable with one that you know is functioning properly. |18| 3. Fast Ethernet and Gigabit Ethernet equipment that supports multiple speeds uses fast link pulse (FLP) signals. a. FLP signals differ from NLP signals in that they include a 16-bit data packet that the devices use to autonegotiate their connection speed. (1) The data packet contains a link code word that consists of a selector field and a technology ability field. (2) The devices use these fields to advertise their capabilities, including the speeds they can run at, and whether they support full-duplex (that is, simultaneous bidirectional) communications. b. By examining the link code word supplied by the other device, the network interface adapter and the hub both configure themselves to use the best transmission mode that they have in common according to the following priorities: (1) 1000Base-T (full-duplex) (2) 1000Base-T (3) 100Base-TX (full-duplex) (4) 100Base-T4 (5) 100Base-TX (6) 10Base-T (full-duplex) (7) 10Base-T c. FLP signals are fully compatible with the NLP signals that are used by devices that cannot operate at multiple speeds. (1) If you connect a computer with a 10/100 dual-speed Fast Ethernet adapter to a standard 10Base-T hub, the adapter (a) Receives the NLP signal from the hub (b) Determines that 10 Mbps half-duplex is the fastest speed it has in common with the hub (c) Configures itself accordingly (2) The 10Base-T hub, receiving the FLP signal from the adapter, cannot interpret the link code word and sees the signal only as a normal NLP link test. (a) No autonegotiation occurs at the hub because none is possible. d. Some dual-speed devices also have LEDs that light up to indicate the speed at which the device has configured itself to run. (1) Do not confuse this LED with the link pulse LED. 10 Outline, Chapter 18 Network+ Certification, Second Edition
  11. 4. Link pulse LEDs are only an indication that the network connection is wired properly; do not mistake them for a true diagnostic test of the network’s transmission capabilities. a. Just because the LEDs are lit does not necessarily mean that the connection can carry Ethernet traffic. b. Link pulse signals run far more slowly than Ethernet data signals and are not affected by electromagnetic interference, such as crosstalk, the way that Ethernet data signals are. (1) If you use a “silver satin”–type telephone cable to connect a network interface adapter to a hub, the link pulse LEDs will usually light. (2) In the “silver satin” cable, the wire pairs are not twisted, which results in high levels of crosstalk. (3) When Ethernet signals are transmitted over “silver satin” cable, crosstalk causes the signals to bleed over from one wire pair to the others. (a) The crosstalk causes the network interface adapters to receive signals over both the transmit and receive wire pairs simultaneously. (4) UTP Ethernet adapters interpret simultaneous signals on both wire pairs as an indication that a collision has occurred. (5) In fact, even though there has been no real collision, the adapters behave as though there has been one. (a) The adapters discard the supposedly damaged packets and begin the data retransmission process. (b) This is called a phantom collision, and if it occurs frequently enough, it can seriously degrade the efficiency of the network. |19| 4. Error Displays A. The most obvious indication that a problem has occurred on a computer is an error message that appears on the screen. 1. Error messages are generated primarily by applications and operating systems. 2. They can inform you when something has gone wrong with a computer or the software running on it. B. In most cases, error messages cannot give you specific information about a problem with the network itself. 1. There is usually no way for the computer to test or communicate with network components except for other computers. 2. An error message generated by an operating system might tell you that the computer could not communicate with another computer on the network. a. However, the error message usually cannot tell you why unless the problem is with the computer generating the message. C. Many error messages are ambiguous or misleading, so you might need help interpreting them. Outline, Chapter 18 11 Network+ Certification, Second Edition
  12. D. If you do not understand an error message, record the exact message, including all number and letter codes, memory addresses, and other types of information, even if you do not know what they mean. 1. The manufacturer’s technical support department might be able to use the information to resolve the problem. 2. You should inform all network users to record the same information for any error messages they receive. 3. One of the easiest ways to preserve a complex error message is to save an image of the entire screen. a. On a Windows system, press PRINT SCREEN to copy the current screen image to the clipboard. (1) Open the Windows Paint program and select Paste on the Edit menu to paste the image into the program. (2) Print the error message or save it to a bitmap file. b. The screen capture works as long as the computer can still run programs. (1) If the problem halts the system and generates a fatal system error (sometimes known as “the blue screen of death”) in Microsoft Windows NT or Windows 2000, you have no recourse other than to write down the error information. E. If you receive error messages that you do not understand, it is useful to have the documentation for the products on a searchable medium, such as a CD-ROM or a Web site. |20| 5. Event Logs A. An event log is a running record of processes that documents an operational history of the product involved. 1. Many applications, operating systems, and networking components maintain logs of their activities. a. You should check the logs on a regular basis for problems or even just for informational messages. 2. Some products keep logs as text files and may or may not supply the means for you to view them. a. You might have to open the log file in a separate application to read the contents. 3. Log files can grow very large, so to read them you might have to use a text editor that can handle large files. B. Logging options 1. Some applications let you specify whether you want them to log their activities and how much detail you want in the logs. 2. When you work with a newly installed or reconfigured application or device, it is a good idea to keep logs for a while. 3. Consider the amount of detail you want in the logs. a. Selecting the most detailed option might not always be best. (1) You want an accurate picture of the product’s activities, but you do not want to spend hours poring through log files. 12 Outline, Chapter 18 Network+ Certification, Second Edition
  13. b. For example, most backup programs have a full detail logging option, which means that the log maintains a complete listing of every file that the program backs up. (1) This might be useful in some instances, but it creates an enormous log file that is difficult to scan for basic information, such as whether a backup job has been completed successfully. (2) In this case, you are better off selecting a less detailed log unless you suspect a problem that requires more specific information. c. Highly detailed log files take up a lot of disk space, so be careful not to let them grow unchecked. 4. Many applications that keep logs let you set parameters that limit the log file size. |21| a. For example, the IIS application included with Microsoft Windows 2000 Server allows you to specify when each service should create a new log file—hourly, daily, weekly, or monthly. (1) You can also specify a maximum size for the log file or leave it with no limitations. |22| (2) By selecting the Extended Properties tab, you can select what information the service should include in the log. |23,24,25| C. Event Viewer |24| 1. Some logs are maintained and displayed by a separate application, such as the Event Viewer included in Windows 2000 and Windows NT. 2. To launch Event Viewer in Windows 2000, select Event Viewer on the Start menu’s Programs/Administrative Tools group. a. By default, the application displays the logs for the current system. b. To view the logs of another computer running Windows 2000, select Event Viewer in the left pane, and then select Connect To Another Computer on the Action menu. |25| 3. Event Viewer maintains lists of messages generated by various elements of the operating system. a. Each log entry is listed as a separate item with the date and time that it was generated, the process that generated it, the event ID, and other important information. 4. By default, Microsoft Windows 2000 Professional contains three different logs—an Application Log, a Security Log, and a System Log— all of which are maintained independently. a. The Windows 2000 Server products include these three logs, plus others, depending on the services installed. (1) An Active Directory domain controller, for example, also has Directory Service, DNS Server, and File Replication Service logs. 5. Each event in each log is assigned one of the following classifications and marked with a corresponding icon: a. Information. Indicates the successful completion of an event, such as launching a server application or loading a device driver Outline, Chapter 18 13 Network+ Certification, Second Edition
  14. (1) Information messages are a normal by-product of the computer’s operations and are not considered problematic. b. Warning. Indicates a condition that is not necessarily a problem now, but might become a problem in the future, such as when available memory or disk space drops below a certain level c. Error. Indicates the occurrence of a significant problem that has caused a loss of system functionality or a loss of data (1) Requires immediate attention, such as when a service fails to load or a drive goes offline |26| 6. When you double-click a log entry in Event Viewer’s main display, an Event Properties dialog box appears. a. Contains more detailed information about the entry, including a description and any data generated by the event b. You can use the arrow buttons in the upper right corner of the dialog box to scroll up and down through the events in the log. c. The entries stored in Event Viewer are sometimes also displayed as pop-up error messages. 7. One advantage of using Event Viewer is that you do not have to write down most error messages because you can always view or print them later. a. To copy the contents of the entry to the Windows clipboard, click the third button in the upper right corner of the Event tab. b. Paste the clipboard contents into Microsoft Notepad or another application for printing or faxing to a technical support representative. |27| 6. Network Management Products A. Error messages generated by operating systems and applications are usually easy to monitor, but receiving error messages from other network components, such as routers or computers at remote locations, can be more difficult. 1. A stand-alone router does not have a screen to display error messages, but many networking devices can supply information about their status. B. Network management products, such as Hewlett Packard’s OpenView, provide a comprehensive view of network systems and processes. 1. These products use a distributed architecture based on a specialized management protocol, such as the Simple Network Management Protocol (SNMP) or the Remote Monitoring (RMON) protocol. C. Network management products often include a large collection of other functions as well, including the following: 1. Software distribution and metering 2. Network diagnostics 3. Network traffic monitoring 4. Report generation D. Network management products are not designed for small networks, and they are not cheap. 14 Outline, Chapter 18 Network+ Certification, Second Edition
  15. E. Deploying a network management system is a complex undertaking that is intended for administrators of large networks who cannot monitor all their network devices individually. 1. You must be sure that, when you design and build your network, all the equipment you use supports the network management protocol you intend to use. |28| F. SNMP 1. A TCP/IP application layer protocol and query language that specially equipped networking devices use to communicate with a central console 2. Many networking hardware and software products, including routers, switches, hubs, operating systems, and applications, are equipped with SNMP agents. a. An SNMP agent is a software module that gathers information about the product and delivers it to a computer that has been designated as the network management console. b. The agents gather specific information about the network devices and store it as managed objects in a management information base (MIB). c. At regular intervals, the agents transmit their MIBs to the console, using SNMP messages, which are carried inside User Datagram Protocol (UDP) datagrams. d. The console collates the information that it receives from the agents and provides a composite picture of the network and its processes. e. The console software can usually create a map of the interconnections between network devices and display detailed log information for each device. f. If a serious problem occurs, an agent can generate a special message called a trap. (1) The agent transmits the trap immediately to the console, which alerts you to a potentially dangerous condition. 3. In many cases, you can configure the console software to send alerts to administrators in a variety of ways, including pop-up messages, e-mails, faxes, and even pager signals. 7. Performance Monitors A. Network monitoring tools, such as the Windows 2000 Performance console, display activities as they occur. 1. The Performance console displays ongoing information about the processes running on the computer that it is installed on, but many of these processes can involve network activities. B. The Windows 2000 Performance console is a graphical application that displays real-time statistics about a computer’s activities. 1. It can also maintain logs of those statistics and generate alerts when their values reach certain levels. |29| 2. The System Monitor component of the Performance console lets you select the statistics you want to monitor and view them in a dynamic display. 3. The various elements that the program can monitor are called counters. Outline, Chapter 18 15 Network+ Certification, Second Edition
  16. a. Windows 2000 includes dozens of counters for many different hardware and software components, such as the processor, the memory, and the network interface, as well as individual services and applications. b. Third-party software products can also add their own counters to System Monitor, enabling you to track their specific activities. 4. Using System Monitor |30| a. To add counters to the display, click the + (add) button on the toolbar to open the Add Counters dialog box. b. You can select as many counters as you want from each of the categories in the Performance Object list, and for any computer on the network. c. The Explain button provides a brief definition of what the highlighted counter is designed to measure. d. After you have selected all the counters that you want to display in the Add Counters dialog box, click Close. (1) The main System Monitor screen immediately begins graphing the values of the counters you selected. e. Click Properties in the main System Monitor screen to change the display from a line graph to a histogram or a numerical report. f. To display information in a graph effectively, you might also have to modify the scale used in the y axis, so that all of your counters are not piled on top of each other at the bottom of the graph. g. You can also change the colors used in the graph, the interval at which the information is updated, and other display characteristics. |31| C. You can also use the Performance Logs and Alerts feature of the Performance console to create log files containing the statistics of particular counters over a period of time. |32| 1. You can create alerts that are triggered when the value of a particular counter reaches a level that you specify. 2. You can then configure the alert to notify you of the situation by adding an entry to the event log, sending a network message, starting a performance data log, or executing a program that you specify. 3. The Performance console and other similar tools can give you information that you can use to monitor and diagnose problems on your network. D. Other operating systems have their own monitoring applications. |33| 1. Example: MONITOR.NLM in Novell NetWare 2. Several third-party products are also available with which you can continually observe the status of your network. |34| 8. Protocol Analyzers A. Are tools that capture a sample of the traffic passing over the network, decode the packets into the language of the individual protocols that they contain, and let you examine them in minute detail 16 Outline, Chapter 18 Network+ Certification, Second Edition
  17. 1. Often compile network traffic statistics, such as the number of packets using each protocol and the number of collisions that occur on the network B. Using the protocol analyzer to capture and display network traffic is relatively easy. 1. However, interpreting the information that the analyzer presents and using it to troubleshoot your installation requires a detailed understanding of the protocols running on the network. 2. There is no better way to acquire this understanding than to examine the data transmitted over a live network. C. Are useful tools that can also be used for malicious purposes 1. In addition to displaying the information in the captured packets’ protocol headers, the analyzer can also display the data carried inside the packets. a. This can sometimes include confidential information, such as unencrypted passwords and personal correspondence. 2. If you can avoid it, do not permit your users to run protocol analyzers unsupervised. D. Can be either a device with a proprietary interface that you connect to a network to capture traffic, or a software program that runs on a computer that is already connected to the network 1. Some network consultants who frequently work at different sites install a software-based protocol analyzer on a portable computer and, by changing PC Card network interface adapters, are ready to connect to virtually any network. E. Typically work by switching the network interface adapter they use to access the network into promiscuous mode 1. In promiscuous mode, a network interface adapter reads and processes all the traffic that is transmitted over the network, not just the packets that are addressed to it. a. This means that you can examine all the traffic on the network from one computer. 2. Running a protocol analyzer in promiscuous mode also requires a network interface adapter that is capable of being switched into that mode. 3. Most, but not all, adapters can run in promiscuous mode. F. The most common protocol analyzer today is the Microsoft Network Monitor application, mostly because it is included with all the Windows 2000 Server and Windows NT Server products. 1. The Network Monitor application is also included with the Microsoft Systems Management Server (SMS) product, but with an important difference. a. The version of Network Monitor in SMS supports promiscuous mode, but the version in Windows 2000 Server and Windows NT Server does not. Outline, Chapter 18 17 Network+ Certification, Second Edition
  18. (1) This means that the server version lets you capture only the traffic addressed to or transmitted by the server that Network Monitor is running on. G. Capturing traffic 1. The first step of a protocol analysis is to capture a sample of the network traffic. 2. Select the network interface that you want to use (if there is more than one) and start the capture process by clicking Start Capture on the toolbar. 3. The program reads the packets that arrive over the network interface and stores them in a buffer for later examination. a. Protocol analyzers, like detailed log files and performance monitors, offer a huge amount of information. (1) The trick to using the tool effectively is zeroing in on what you need. (2) On a busy network, a packet capture of only a few seconds can consist of thousands of packets, generated by dozens of different systems. (3) Protocol analyzers have filters that let you select the packets that you want to capture by using criteria such as (a) The source computer address (b) The destination computer address (c) The protocols used to build the packets (d) The information found in the packets (4) If you specify capture filters, you have a much smaller traffic sample that contains less of the extraneous information generated by other network processes. b. Some protocol analyzers offer more comprehensive capture filtering capabilities, such as selecting specific application layer protocols, than Network Monitor does. 4. When you start the capture, the software displays the number of packets passing over the network and the number that are being captured by the filter. 5. When you have a sample of sufficient size, click Stop Capture. H. Displaying captured traffic |35| 1. When you have captured a network traffic sample, click Display Captured Data to show your sample in the Capture Summary window. 2. This window displays a chronological list of the packets in your sample, including the following information: a. Frame. Shows the number of the frame (or packet) in the sample b. Time. Indicates the time (in seconds) that the packet was captured, measured from the beginning of the sample c. Src MAC Addr. Gives the hardware address of the network interface in the computer that transmitted the packet 18 Outline, Chapter 18 Network+ Certification, Second Edition
  19. (1) For computers that the analyzer recognizes by a friendly name, such as a Network Basic Input/Output System (NetBIOS) name, this field contains that name instead of the address. (a) The computer the analyzer is running on is identified as LOCAL. d. Dst MAC Addr. Gives the hardware address of the network interface in the computer that received the packet (1) Friendly names are substituted if available. (2) By building up an address book of the computers on your network, you can eventually have captures that use only friendly names. e. Protocol. Shows the dominant protocol in the packet (1) Each packet contains information generated by protocols running at several different layers of the Open Systems Interconnection (OSI) reference model. (2) The protocol specified here indicates the primary function of the packet. (a) For example, a Hypertext Transfer Protocol (HTTP) packet also uses the Transmission Control Protocol (TCP), IP, and Ethernet protocols, but the the packet’s function is to deliver an HTTP message. f. Description. Indicates the function of the packet, using information specific to the protocol referenced in the Protocol field (1) For an HTTP packet, for example, this field indicates whether the packet contains an HTTP GET Request or a Response message. g. Src Other Addr. Specifies another address used to identify the computer that transmitted the packet (1) In the case of the TCP/IP protocols, this field contains the IP address. h. Dst Other Addr. Specifies another address (such as an IP address) used to identify the computer that received the packet i. Type Other Addr. Specifies the type of address used in the Src Other Addr and Dst Other Addr fields 3. From this main display, you can track the progress of transactions between specific pairs of computers on your network. 4. To zero in on a particular message exchange, you can use Network Monitor to apply filters to already-captured samples as well as during the capture. a. The interface you use to create the filters is the same one you use to select the capture filters. b. When you apply a filter, you see only the packets that conform to the parameters you have chosen. (1) The other packets are still there in the sample; they are just not being displayed. c. You can modify the filter at any time to display more or less data. Outline, Chapter 18 19 Network+ Certification, Second Edition
  20. |36| 5. When you double-click one of the packets listed in the main Capture Summary window, the display splits into three parts. a. The top section contains the original capture summary, with the selected packet highlighted. b. The middle section contains the contents of the selected packet, in a fully interpreted, expandable display. (1) The center section of the display is where you can learn the most about the contents of each packet. (2) The analyzer interprets the data in the packet and separates it into the headers for the protocols operating at the various layers. |37| (3) Clicking the plus sign (+) next to a protocol expands it to display the contents of the various header fields. (4) The header fields display the source port and destination port numbers. (5) The destination port number contains (a) The protocol code for HTTP (b) The sequence number and acknowledgment number values used to implement TCP’s packet acknowledgment and error detection mechanisms (c) The other header fields |38| c. The bottom section contains the raw, uninterpreted contents of the packet in hexadecimal and alphanumeric form. (1) The raw data display at the bottom of the window is used primarily to view the application layer data carried as the payload inside a packet. (2) When you look at an HTTP Response packet transmitted by a Web server to a browser, you see the HTML code of the Web page the server is sending to the browser. Chapter 18, Lesson 3 Network Testing and Monitoring Tools 1. Introduction A. Some network tools used by network administrators can do more than merely provide information. 1. Most of these specialized tools are used to install and troubleshoot cables, primarily because cables are a component of the network that have no means of displaying error messages. |39| 2. Crossover Cables A. A crossover cable, which is used to connect UTP Ethernet computers without a hub, is also a good tool to use for eliminating the hub and the cables as possible sources of a network communications problem. 20 Outline, Chapter 18 Network+ Certification, Second Edition
ADSENSE

CÓ THỂ BẠN MUỐN DOWNLOAD

 

Đồng bộ tài khoản
2=>2