Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.

Similar documents
These tasks can now be performed by a special program called FTP clients.

Admin Report Kit for Exchange Server

BMC Remedyforce Integration with Remote Support

Campuses that access the SFS nvision Windows-based client need to allow outbound traffic to:

BMC Remedyforce Integration with Bomgar Remote Support

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel

SafeDispatch SDR Gateway for MOTOROLA TETRA

Enterprise Installation

Exercise 1: Deploying Windows Server 2012

CaseWare Working Papers. Data Store user guide

Getting started. Roles of the Wireless Palette and the Access Point Setup Utilities

Please contact technical support if you have questions about the directory that your organization uses for user management.

IDEAL ADMINISTRATION 2018

Networks: Communicating and Sharing Resources. Chapter 7: Networks: Communicating and Sharing Resources

USER MANUAL. RoomWizard Administrative Console

Tips For Customising Configuration Wizards

CCNA Security v2.0 Chapter 9 Exam Answers

CCNA 1 Chapter v5.1 Answers 100%

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

WorldShip PRE-INSTALLATION INSTRUCTIONS: INSTALLATION INSTRUCTIONS: Window (if available) Install on a Single or Workgroup Workstation

Click Studios. Passwordstate. RSA SecurID Configuration

Avigilon Control Center Server User Guide. Version 6.8

CCNA Security v2.0 Chapter 3 Exam Answers

IT Essentials (ITE v6.0) Pretest Exam Answers 100% 2016

Planning, installing, and configuring IBM CMIS for Content Manager OnDemand

Avigilon Control Center Server User Guide. Version 6.4

Courseware Setup. Hardware Requirements. Software Requirements. Prerequisite Skills

Avaya 9610 IP Telephone End User Guide

App Orchestration 2.6

ABELDent Platform Setup Conventions

1. The first section examines common performance bottlenecks that need to be considered.

TN How to configure servers to use Optimise2 (ERO) when using Oracle

1 Getting and Extracting the Upgrader

INSERTING MEDIA AND OBJECTS

CCNA 1 Chapter v5.1 Answers 100%

Dear Milestone Customer,

Manual for installation and usage of the module Secure-Connect

Skype Meetings

Installing AX Server with PostgreSQL

Users, groups, collections and submissions in DSpace. Contents

Welcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network. General

Online Banking for Business USER GUIDE

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu

ABELMed Platform Setup Conventions

Release Notes. Dell SonicWALL Security firmware is supported on the following appliances: Dell SonicWALL Security 200

2. When logging is used, which severity level indicates that a device is unusable?

Able2Extract Server 3.0. User Guide

Gemini Intercom Quick Start Guide

Troubleshooting Citrix- Published Resources Configuration in VMware Identity Manager

Internet Explorer Configuration Reference

Table of Contents. Introduction... 2 Installing the ABBYY FineReader Engine Library... 3

Enabling Your Personal Web Page on the SacLink

INSTALLING CCRQINVOICE

Packet Tracer - Configuring a Zone-Based Policy Firewall (ZPF)

Summary. Server environment: Subversion 1.4.6

H A N D O U T : W I N D O W S N E T W O R K I N G

CSC IT practix Recommendations

Intro. to Computer Repair & Advanced Computer Repair

IMC QoS Manager 7.3 (E0502) Copyright 2015, 2016 Hewlett Packard Enterprise Development LP

Connect+/SendPro P Series Networking Technical Specification

WinEst 15.2 Installation Guide

In Outlook, how do I allow other users to view my Calendar or other folders in my Exchange mailbox?

Using the Swiftpage Connect List Manager

Proficy* SmartSignal 6.1 Installation Guide

Sonic PDF Server 3.0. User Guide

AvePoint Perimeter Pro 1.9

Quick Start Guide. Basic Concepts. DemoPad Designer - Quick Start Guide

Configuring the McAfee Windows Event Collector Management Utility *Also can provide client transmission of other non-windows log files*

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide

Firmware Upgrade Wizard v A Technical Guide

Little Green Button (LGB)

Troubleshooting Citrix- Published Resources Configuration in VMware Identity Manager

Dynamic Storage (ECS)

HPE AppPulse Mobile. Software Version: 2.1. IT Operations Management Integration Guide

IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016

CCNA 1 Chapter v5.1 Answers 100%

SANsymphony Installation and Getting Started Guide. November 7, 2016

I. Introduction: About Firmware Files, Naming, Versions, and Formats

Telkom VPN-Lite router setup User Manual Billion 810VGTX

September 24, Release Notes

Wave IP 4.5. CRMLink Desktop User Guide

FollowMe. FollowMe. Q-Server Quick Integration Guide. Revision: 5.4 Date: 11 th June Page 1 of 26

Outlook Web Application (OWA) Basic Training

Upgrading Kaltura MediaSpace TM Enterprise 1.0 to Kaltura MediaSpace TM Enterprise 2.0

ClassFlow Administrator User Guide

Launching Xacta 360 Marketplace AMI Guide June 2017

FIREWALL RULE SET OPTIMIZATION

Using the Swiftpage Connect List Manager

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

1. What is a characteristic of Frame Relay that provides more flexibility than a dedicated line?

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)

Power365. Quick Start Guide

Operational Security. Speaking Frankly The Internet is not a very safe place. A sense of false security... Firewalls*

System Requirements for SurveyTracker Plus 6.0

Max 8/16 and T1/E1 Gateway, Version FAQs

Renewal Reminder. User Guide. Copyright 2009 Data Springs Inc. All rights reserved.

1on1 Sales Manager Tool. User Guide

TDR and Trend Micro. Integration Guide

USER GUIDE. Thanks for purchasing the igate! You ll need to follow these five Configuration Steps to get your igate up and running:

TRAINING GUIDE. Overview of Lucity Spatial

Transcription:

Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are nw less expensive and easier t perate. They are helpful t identify the prblem in physical devices. Example : Digital Vltmeters It is check the amunt f vltage passing thrugh resistance. Time-Dmain Reflect meters (TDRs) A time-dmain reflect meter (TDR) lcate t find the faults in metallic cables Advanced Cable Testers LAN Cable Tester is a tl fr testing LAN cables and find all the prblems assciated with the cable using LED blw at bth side. Oscillscpes Oscillscpes are electrnic cmpnent that measure the amunt f signal vltage per unit f time and display the result n a mnitr. - Sftware Tls They are helpful t identify the prblem in lgical prgram. Example : Netwrk Mnitrs It gather infrmatin abut packet types, errrs, and packet traffic t and frm each cmputer. 1

Prtcl Analyzers It perfrm real-time netwrk traffic analysis using packet capture, decding, and transmissin data. Netwrk General Sniffer Nvell's LAN alyzer - Mnitring and Trubleshting Tls After a netwrk has been installed and is peratinal, the administratr needs t make sure it perfrms effectively. T d this, the administratr will need a tls is called mnitring tls. Example : Perfrmance Mnitrs These mnitrs can view peratins in bth real time and recrded time fr: Prcessrs. Hard disks. Memry. Netwrk utilizatin. The netwrk as a whle. Netwrk Mnitrs This tl gives the administratr the ability t capture and analyze netwrk data streams t and frm the server. Q.2 Explain Hardware trubleshting tls. - They are nw less expensive and easier t perate. They are helpful t identify the prblem in physical devices. - List the different type f hardware trubleshting tls. 2

Digital Vltmeters The digital vltmeter (vlt-hm meter) is the primary all-purpse electrnic measuring tl. It is check the amunt f vltage passing thrugh resistance. Vltmeters can determine fllwing: The cable is cntinuus. The cable can carry netwrk traffic. Tw parts f the same cable are tuching An expsed part f the cable is tuching anther cnductr, such as a metal surface. Time-dmain reflect meters (TDRs) A time-dmain reflect meter (TDR) lcate t find the faults in metallic cables A TDR transmits a shrt rise time pulse alng the cnductr. And This can be a square wave plus If The entire transmitted pulse will be cntinue in the far-end terminatin and n signal will be reflected tward the TDR If The entire transmitted pulse will be break in the far-end terminatin signal will be reflected tward the TDR. LAN cable tester. LAN Cable Tester is a tl fr testing LAN cables and find all the prblems assciated with the cable using LED blw at bth side. In them there are 8 LED at bth side. One tester part feet at ne side f cable and anther part feet at anther side f cable. If LED is nt blw then we find that the prblem in which pair. 3

Oscillscpes Oscillscpes are electrnic cmpnent that measure the amunt f signal vltage per unit f time and display the result n a mnitr. When It used with TDRs, an scillscpe can display: Shrts in cable. Sharp bends in the cable. Breaks in the cable Lss f signal pwer. Crssver Cables It is LAN cable use fr check the netwrk cnnectivity between tw Cmputers, tw same devices. Q.3 Explain Sftware trubleshting tls. - They are helpful t identify the prblem in lgical prgram like cmmand, internet lading prblem, file sharing etc. Netwrk Mnitrs Netwrk mnitrs are sftware tls that track all selected part f netwrk traffic. They examine data packets 4

It gather infrmatin abut packet types, errrs, and packet traffic t and frm each cmputer. Netwrk mnitrs are very useful fr establishing part f the netwrk baseline. After the baseline has been established, yu will be able t trublesht traffic prblems and mnitr netwrk usage. It determine when it is time t upgrade. As an example a new netwrk is installed, yu determine that netwrk traffic is utilized at 40 percent is increases. Prtcl analyzers It is als called "netwrk analyzers,". It perfrm real-time netwrk traffic analysis using packet capture, decding, and transmissin data. These are the tls used mst ften t mnitr netwrk interactivity. Prtcl analyzers lk inside the packet t identify a prblem in Cabling. Sftware. File servers. Wrkstatins. Netwrk interface cards. The prtcl analyzer detect netwrk prblems including: Faulty netwrk cmpnents. Cnfiguratin r cnnectin errrs LAN bttlenecks. Traffic fluctuatins. Prtcl prblems. Applicatins that might cnflict. Unusual server traffic. Netwrk General Sniffer 5

Sniffer measures netwrk traffic in kilbytes per secnd, frames per secnd, r as a percentage f available bandwidth. It will gather LAN traffic statistics, detect faults such as beacning, and present this infrmatin in a prfile f the LAN. Sniffer can als identify bttlenecks by capturing frames between cmputers and displaying the results. Netwrk Cmmand PING Ping allws a user t ping anther netwrk IP address. This can help determine if the netwrk card can cmmunicate within the lcal netwrk r utside netwrk. IPCONFIG It display the infrmatin abut ip address, it gateway, subnet mask etc. Q.4 Explain Mnitring and Trubleshting Tls. - After a netwrk has been installed and is peratinal, the administratr needs t make sure it perfrms effectively. T d this, the administratr will need a tls is called mnitring tls. Perfrmance Mnitrs Mst current netwrk perating systems include a mnitring utility that will help a netwrk administratr keep track f a netwrk's server perfrmance. These mnitrs can view peratins in bth real time and recrded time fr: Prcessrs. Hard disks. Memry. Netwrk utilizatin. 6

The netwrk as a whle. These mnitrs can: Recrd the perfrmance data. Send an alert t the netwrk manager. Start anther prgram that can adjust the system back int acceptable ranges. Netwrk Mnitrs Sme servers include netwrk mnitring sftware. Windws NT Server, fr example, includes a diagnstic tl called Netwrk Mnitr. This tl gives the administratr the ability t capture and analyze netwrk data streams t and frm the server. This data is used t trublesht ptential netwrk prblems. - The packets f data in the data stream cnsist f the fllwing infrmatin: The surce address f the cmputer that sent the message. The destinatin address f the cmputer that received the frame. Headers frm each prtcl used t send the frame. The data r a prtin f the infrmatin being sent Q.5 Explain File and Directry permissins. Yu can set security permissins n files and flders. These permissins grant r deny access t the files and flders. Yu can view security permissins fr files and flders by cmpleting the fllwing steps: 1. In Windws Explrer, right-click the file r flder yu want t wrk with. 2. Frm the pp-up menu, select Prperties, and then in the Prperties dialg bx click the Security tab. 7

3. In the Name list bx, select the user, cntact, cmputer, r grup whse permissins yu want t view. If the permissins are dimmed, it means the permissins are inherited frm a parent bject. Permissin Meaning fr Flders Meaning fr Files Read Write Read & Execute List Flder Cntents Mdify Full Cntrl Permits viewing and listing f files and subflders Permits adding f files and subflders Permits viewing and listing f files and subflders as well as executing f files Permits viewing and listing f files and subflders as well as executing f files; inherited by flders nly Permits reading and writing f files and subflders; allws deletin f the flder Permits reading, writing, changing, and deleting f files and subflders Permits viewing r accessing f the file's cntents Permits writing t a file Permits viewing and accessing f the file's cntents as well as executing f the file N/A Permits reading and writing f the file; allws deletin f the file Permits reading, writing, changing and deleting f the file 8

Q.6 What is user accunt? Explain with their types. A user accunt is a cllectin f infrmatin that tells Windws which files and flders yu can access, what changes yu can make t the cmputer, and yur persnal preferences, such as yur desktp backgrund r screen saver. User accunts let yu share a cmputer with several peple, while having yur wn files and settings. Each persn accesses his r her user accunt with a user name and passwrd. There are three types f them Built in user accunt This type user accunt created by default when perating system is installed. It is main accunt all ther accunt created frm them It have all permissin Example : Administratr Lcal user accunt User accunts defined n a lcal cmputer are called lcal user accunts Lcal user accunts have access t the lcal cmputer nly, and they must authenticate themselves befre they can access netwrk resurces It is develping frm built in user accunt We can als put permissin n them fr limited access Dmain cntrl user accunt Users accunts defined in Active Directry are called dmain user accunts It cntrl by dmain f server. Frm server side we can create the accunt and client side we can access them It cnnected using dmain 9

We can use map drive fr sharing hard drive fr access private data f user. Q.7 Explain Grup user accunt. Yu use grups t grant permissins t similar types f users. If a user is a member f a grup that can access a resurce, that particular user can access the same resurce. Yu can give a user access t varius wrk-related resurces just by making the user a member f the crrect grup. Nte that while yu can lg n t a cmputer with a user accunt, yu can't lg n t a cmputer with a grup accunt, Because different Active Directry dmains may have grups with the same name. When yu wrk with Active Directry, yu may als need t specify the fully qualified dmain name fr a grup. Grup Types Lcal grups Security grups Grups that are defined n a lcal cmputer. Lcal grups are used n the lcal cmputer nly. Yu create lcal grups with the Lcal Users And Grups utility. Yu define security grups in dmains using Active Directry Users And Cmputers. Distributin grups Grups that are used as e-mail distributin lists. They can't have security descriptrs assciated with them. Yu define distributin grups in dmains using Active Directry Users And Cmputers. 10

Q.8 Explain Map Drive. Flder f hard disk drive are cnfigure fr sharing them in netwrk r LAN is called map drive Z,X,Y etc letter used fr them Step Right click n my cmputer icn Click n map netwrk drive frm pp up menu Select flder fr share Select letter Click n OK Q.9 What is Netwrk security? List and explain different types f them. Netwrk security is technical which prevent ur cmputer netwrking frm unauthrized data r user access. Netwrk security uses the authrizatin f access t data in a netwrk, which is cntrlled by the netwrk administratr. Users chse r are assigned an ID and passwrd r ther authenticating infrmatin that allws them access t infrmatin and prgrams. Authenticatin We have t use the user name and passwrd fr access the accunt, s ther peple can nt see ur data Encryptin It is the technique using them the plain text can cnvert in t chipper text using key. It means ur data cnvert int cde wrd s ther peple can nt read that data Anti virus sftware It is the ne type f sftware using them we can prtect frm virus Firewall It is the tl which prevent the incming r ut ging data which are thread with sme harmful effect. 11