0% found this document useful (0 votes)
108 views64 pages

Troubleshooting of Network

Uploaded by

Crystal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views64 pages

Troubleshooting of Network

Uploaded by

Crystal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 64

Network Management and

Administration
Unit 3 - Troubleshooting of Networking
SYLLABUS
3.1 Designing network
3.1.1 Accessing network needs- applications, users, network services, security and
safety, growth and capacity planning
3.1.2 Meeting network needs
3.2 Install and configure
3.2.1 Preparing for installation
3.2.2 Creating windows server boot disk
3.2.3 Installing windows server
3.3.4 Configuring server/client
3.3 Setting windows server
3.3.1 Creating Domain controller
3.3.2 Adding DHCP role and WINS roles
3.3.3 Adding File server
3.3.4 Adding Print server
3.3.5 Adding Web server administration.
3.1 Designing Network
▪ Network design is not limited to the transport of data.
▪ It is a broad field that covers analysis, planning and implementation
of user applications as well as network architecture, infrastructure
and topology, data transport techniques, standards, services and
protocols.
▪ One of the key features of a good design is that it is built to support
both, the present and future needs.
Accessing Network Needs
▪ What networking infrastructure do you already have in place?
▪ How many computers and networked devices do you have?
▪ Develop the structure of the new internetwork.
▪ Determine the type of network that best fits a company's needs.
▪ Chooses the appropriate media and hardware to setup successful
network.
▪ Does your office's design and layout impose physical constraints on
your planning process? For example, is there available space in your
floors, walls, or ceilings (often in the form of electrical conduits)
where you can string your network cables?
Accessing Network Needs
▪ What networked applications do end users rely on most heavily, and
how much bandwidth do these applications consume?
▪ Are you planning any changes to your technology infrastructure (such
as additional employees or new applications) that might have an
impact on your networking needs?
▪ How much money do you have budgeted for the installation and
maintenance of your networks?
▪ Implement your design.
▪ Monitor your new internetwork. It is working like you expected?
Accessing Network Needs
Network Size and Scale
Applications
Users
Network Services
Security and Safety
Growth and Capacity planning
Network Size and Scale
▪ Scale is usually the first and most important determination in
network planning as it will often determine or influence your other
decisions.
▪ While there are other scales discussed in networking literature, most
nonprofits and libraries only need to focus on the two or three
network scales that impact small and mid-sized organizations (LANs,
WANs, and CANs).
Local area network (or LAN)
▪ A local area network (or LAN) is designed and implemented at the
scale of a single building or office.
▪ Its primary function is the interconnection of the computing
resources within a single organization.
▪ In most cases, LANs use Ethernet over twisted-pair cabling or wireless
technology.
Wide area network (or WAN)
▪ A wide area network (or WAN) connects a single office or branch
LAN to its parent organization's network and all the millions of
networks that together make up the Internet.
▪ Most authorities define WAN as a network that crosses one or more
jurisdictional boundaries (metropolitan, regional, or national).
▪ Very few organizations have the resources to build and maintain their
own WAN links, and it's usually more cost-effective to lease them
from the local phone or cable company.
▪ WAN links depend on numerous technologies that vary considerably
in terms of speed, cost, and bandwidth.
Campus area network (or CAN)
▪ A campus area network (or CAN) connects multiple LANs belonging
to the same organization when they're in close geographic proximity.
▪ Since most nonprofits operate at the scale of a single office or main
office with branches, CANs are only a consideration for the largest
organizations.
▪ As with WANs, an organization can build its own CAN, but most opt to
lease facilities from their local ISPs.
Applications
Decide on the applications requirement in the network based on
following factors:
How many applications will be installed and accessed?
Where they will be installed? On server or at client side?
Who can access which application?
Establish authentication and authorization procedures required for
access permissions for applications in the network?
User
Users are one of the most important stack holder for any network.
▪ Decided how many users will be in the network?
▪ How many Roles and rights to manage?
▪ How to create and implement group and establish policies?
Network Services
Services the network is to provide based on the company need.
File Sharing
Mail Server
Fax Service
Directory Service
Disk Storage
Print Sharing
Web Hosting and Deployment
Database Sharing
Security and Safety
▪ Security is often the primary reason for choosing a server-based
approach to networking.
▪ In a server-base environment, on administrator who sets the policy
and applies it to every user on the network can manage security.

▪ A server-based Network can share individual files within a directory


without making the directory itself available to everyone on the
network.
Growth and Capacity Planning
▪ As the network grows a server-based network can be divided
according to organizational needs.

For example, one server might be designated for the accounting


department and another server designated for the sales department.
Meeting Network Needs
❑ Once all requirements of network are accessed we need to decided
on some of the important factors.
Choosing Network Type
Choosing Network Structure
Choosing Network Media
Installing Network Media
Choosing Servers
Choosing Network Type
❖ The type of network you choose to implement will depends on
factors such as the:
Size of the organization
Level of security required
Type of business
Level of administrative support available
Amount of network traffic
Needs of the network users
Network Budget
Choosing Network Structure
❖ Choosing Network Structure required to decide on:
Weather to use wired or wireless network?
Type of media to use to establish the network?
Which network topologies to use?
Network standards to use?

❑ When choosing a network technology, consider the location of your


computers and the desired speed of your network.
❑ You should consider two aspects of the network; the physical layout,
including the location of each piece of hardware and how its relates to the
others, and the physical and logical topology of the proposed network.
Choosing Network Media
▪ The choice of which media to select should not be taken lightly.
▪ The cost of installation can be quite high, especially if your have to do it
twice.
▪ The media you choose will usually be related to the geographic
requirements of the site.
For example: if several of the workstations are located in a manufacturing
environment in which a large amount of electrical noise is generated,
fiber-optic cable might be required because it is unaffected by electrical
signal.
On other hand, in a small office, simple twisted paid cable will usually be
appropriate.
Installing Network Media
▪ Installing network media requires special skills and is best left to a
professional cable installer if the topology is complex.
▪ With a simple topology, however, the necessary skills are well within
our reach.
▪ The simplest way to layout a network in our small-office environment
is to use a physical star.
Choosing Servers
▪ The choice of right type of servers is based on the needs of services
the network is built for.
For example, if the requirement of the network is to store and shared
files and directories among the users then file server should be used.
If users need to print documents frequently like checkout counters at
any mall or market then print server should be installed.
Similarly database server should be used for network applications like
banking and stocks requiring fast and secure installed database
management software
3.2 INSTALLING AND CONFIGURING WINDOWS SERVER

❑ Preparing for installation


Before you start a clean installation of windows server 2012 R2, you
should perform the following steps.
▪ Review the system requirement (Microsoft’s site)
▪ Survey the Hardware prior to performing the installation
▪ Review pre-installation documentation (properly configured)
▪ Obtain the products
▪ Perform pre-installation tasks
▪ Backup the system prior to upgrade.
Microsoft recommend that your also perform the following
actions before installing windows server 2012 R2
3.2.1 PRE-INSTALLATION TASK

Disconnect uninterruptible power supply (UPS) devices


Back up data
Disable antivirus software
Run the windows memory Diagnostic tools
Test RAM.
Provide mass storage drivers if needed
Note that windows firewall is on by default
Disconnect UPS devices.

▪ Disconnect UPS devices.


▪ If you have an uninterruptible power supply (UPS) connected to your
server, disconnect the serial cable before you run Setup.
▪ Setup automatically attempts to detect devices that are connected to
serial ports, and UPS equipment can cause problems with the
detection process.
Run the windows memory Diagnostic tools
▪ Windows Memory Diagnostics Tool is a program that you can use to
run various tests on the physical memory installed on your computer.
▪ When memory in a computer starts to fail, your computer can act in
unpredictable ways such as rebooting on its own, freezing, and
crashing programs.
▪ This utility performs a series of tests on the physical memory and lists
any errors that are found.
▪ In this way you can determine if the problems you are encountering
when using your computer may be related to the RAM going bad or
some other problem.
3.2.1 CONFIGURE BIOS
1. Reboot the system.
2. While booting, go into BIOS configuration screen by hitting F1, F2,
Del or Esc.
3. Select BOOT.
4. Make sure USB/DVD drive as primary boot device and exit.
3.2.2 CREATING WINDOWS SERVER BOOT DISK
1. Microsoft’s official tool
1. Click the Windows START button, and click WINDOWS USB/DVD DOWNLOAD
TOOL in the ALL PROGRAMS list to open the Windows USB/DVD Download
Tool.
2. In the SOURCE FILE box, type the name and path of your Windows ISO file, or
click BROWSE and select the file from the OPEN dialog box. Click NEXT.
3. Select USB DEVICE to create a copy on a USB flash drive or select DVD disk to
create a copy on a DVD disk.
4. If you are copying the file to a USB flash drive, select your USB device in the
drop-down list and click BEGIN COPYING. If you are copying the file up to a
DVD, click BEGIN BURNING.
5. When your Windows ISO file is copied to your drive, install Windows by moving
to the root folder of your DVD or USB drive, and then doubleclick Setup.exe.
3.2.2 CREATING WINDOWS SERVER BOOT DISK
2. Command prompt
1. Insert a USB flash drive into a running computer.
2. Open a Command Prompt window as an administrator.
3. Type diskpart.
4. In the new command line window that opens, to determine the USB flash
drive number or drive letter, at the command prompt, type list disk, and
then click ENTER. The list diskcommand displays all the disks on the
computer. Note the drive number or drive letter of the USB flash drive.
5. At the command prompt, type select disk , where X is the drive number or
drive letter of the USB flash drive, and then click ENTER.
6. Type clean, and the click ENTER. This command deletes all data from the
USB flash drive.
7. To create a new primary partition on the USB flash drive, type create part
pri, and then click ENTER.
3.2.2 CREATING WINDOWS SERVER BOOT DISK
8. To select the partition that you just created, type select part 1, and then click
ENTER.
9. To format the partition, type format fs=ntfs OR fs=fat32 (if it supprts FAT32
format)quick, and then click ENTER.
10. Type active, and then click ENTER.
11. Type exit, and then click ENTER.
12. When you finish preparing your custom image, save it to the root of the
USB flash drive.
3.2.2 CREATING WINDOWS SERVER BOOT DISK
3. Third party software
1. Download Rufus.
2. Open Rufus.exe.
3. When the software launches on the screen, plug in your USB
flash drive.
4. Find the option “Create a bootable USB drive”.
5. From the menu that follows, select an ISO image.
6. Click next and select the os which you want to make disk/USB
7. Then click start,it will make bootable disk/USB.
3.2.3 INSTALLING WINDOWS SERVER
3.3.4 CONFIGURING SERVER/CLIENT
• Steps to changing server name
1. Open server manager
2. Click on configure local server
3. Click on default computer name
4. Click change in system properties window
5. Give new computer name
6. Click ok and restart the computer
7. After restart you can see the server name changed
3.3.4 CONFIGURING SERVER/CLIENT
• Steps to assign static IP address to server
1. At lower corner of your screen, right click on computer icon and
select ‘open network and sharing center’.
2. Click ‘change adapter settings’.
3. Find Ethernet adapter, right click and select properties.
4. Double click on ‘internet protocol version 4(TCP/IP 4)
5. Select “use the following IP addresses” radio button.
6. Fill in the IP address ,subnet mask, default gateway and preferred
DNS server.
7. Click ok.
3.3.4 CONFIGURING SERVER/CLIENT
• Steps to Joining client machine to a domain.
1. Log on to your client machine.
2. Click on start, select properties of computer.
3. Click on change settings, system properties dialog box appears
4. Click on change computer name tab, it will show you ‘computer
name/domain changes’
5. Give user friendly name to client machine and select domain :radio
button ,give domain name in that.
6. Click ok and you will be asked for username and password. This detail is
used to logon to your server domain controller.
7. After that restart the computer.
3.3 SETTING WINDOWS SERVER
▪ 3.3.1 creating domain controller
▪ 3.3.2 ADDING DHCP ROLE (dynamic host configuration protocol)
▪ 3.3.2 WHAT IS WINS?

WINS is a Microsoft NetBIOS Name Server (NBNS).


WINS provides a dynamic NetBIOS name to IP address database.
It also interacts with the Browser Service, which assembles and
provides the Network Neighborhood.
Defining WINS
• Windows Internet Name Service (WINS) is a legacy computer name
registration and resolution service that maps computer NetBIOS names to
IP addresses.
• A Windows computer name (e.g., Computer1), can be considered a host
name and interact with DNS, and/or a NetBIOS name either working alone
or with a WINS server.
• Most companies select to use DNS, but sometimes there is WINS-enabled
devices and WINS servers on older devices.
• Whereas DNS can have hosts added statically or dynamically, WINS only
works in a dynamic fashion.
• No configuration of a WINS server is necessary once it is installed, other
than database replication.
Some applications and services still require WINS
that AD DirectSMB doesn’t support
▪ Exchange 2003 with certain Outlook features
▪ McAfee Enterprise ePolicy Orchestrator
▪ Symantec Endpoint Protection
▪ Symantec Backup Exec
▪ Computer Associates AV
▪ SQL
▪ Mapped Drives
▪ Printer sharing (not published in AD)
▪ and many more….
WINS and DNS
▪ WINS and DNS are both name resolution services for TCP/IP
networks.
▪ While WINS resolves names in the NetBIOS namespace, DNS resolves
names in the DNS domain namespace.
▪ WINS primarily supports clients that run older versions of Windows
and applications that use NetBIOS. Windows 2000, Windows XP, and
Windows Server 2003 use DNS names in addition to NetBIOS names.
▪ Environments that include some computers that use NetBIOS names
and other computers that use domain names must include both WINS
servers and DNS servers.
DNS domain name Vs NetBIOS domain name
▪ DNS domain name The DNS domain name consists of one or more
subdomains separated by a dot (.) and is terminated by a top-level
domain name. For example, in the DNS domain name
corp.contoso.com, the subdomains are corp and contoso and the
top-level domain name is com.
▪ NetBIOS domain name Typically, the NetBIOS domain name is the
subdomain of the DNS domain name. For example, if the DNS domain
name is contoso.com, the NetBIOS domain name is contoso. If the
DNS domain name is corp.contoso.com, the NetBIOS domain name is
corp.
3.3.2 INSTALL WINS Services
1. Open the previous MMC or create a new one.
2. Navigate to Server Manager > Features.
3. Click the Add Features link.
4. Check the WINS Server option as shown in Figure and click Next.
5. Click Install at the Confirmation window. No other configuration is necessary.
6. The installation should succeed. Click Close at the results screen.
7. At this point, if you click on the Features option, you should see several features
installed, including WINS server as shown in Figure
8. To have the WINS server take care of name resolution for Windows clients, go to
the IP Properties window of the client computer, then click the Advanced button
and click the WINS tab. From there, one or more WINS servers can be added.
3.3.3 File Server Role
• The file server role is the most commonly deployed role for
computers running Server 2012.
• Almost every organization with Windows client OSs has at least one
server functioning as a file server.
• Server 2012 also supports storage spaces, a technology that allows
you to create flexible and fault-tolerant virtual drives using multiple
disks.
Deploying the File Server Role
▪ File Server — Provides basic access to shared folders. This role is installed
by default on a computer running Server 2012.
▪ Data Deduplication — Reduces disk utilization by storing only a single copy
of data on a volume.
▪ DFS (Distributed File System) Replication — Provides synchronization of
files across branch offices.
▪ File Server Resource Manager — Allows you to create file screens, manage
folder-level quotas, create file classifications, and generate storage reports.
▪ Storage Services — Provides storage-management functionality.
3.3.3 Print Server Role
▪ A Printer is one of the most important devices for an office network
and being a system administrator you should be able to deploy it.

▪ A print server is a computer system which is directly connected to a


local Printer.
▪ All the print request on the network send to the printer are routed
through the print server.
▪ In modern printers (LAN printer) which are directly connected to the
switch no specialized print server is required rather each machine on
the network servers as a print server.
Print Server Role
▪ Print server is a server that manage one printer in a network or more
with all its functions plus manage other print servers.
▪ A print server arrange the data that is supposed to go to different
printers.
▪ The printers cannot handle the files which come so fast one after
another so here the print server queues the files locally to be
processed when the printer is ready to accept files.
3.3.5 Web Based Administration
❑ Through the web-based administration you can:
▪ Start and stop monitoring
▪ Add new users
▪ View and edit existing users
▪ Delete users
▪ Monitor the system status

The Web administration interface is a web-based tool for configuring


all, from adding data to changing service settings.
IOS Management Commands
▪ Cisco IOS (Internetwork Operating system) software provides access
to several different command modes. Each command mode provides
a different group of related commands.
▪ For security purposes, Cisco IOS software provides two levels of
access to commands: user and privileged.
▪ The unprivileged user mode is called user EXEC mode.
▪ The privileged mode is called privileged EXEC mode and requires a
password.
▪ The commands available in user EXEC mode are a subset of the
commands available in privileged EXEC mode.
IOS Operating Modes
• User EXEC
• Privileged EXEC
• Global configuration
• Interface configuration
• ROM monitor
User EXEC
▪ User EXEC commands allow you to connect to remote devices,
change terminal settings on a temporary basis, perform basic tests,
and list system information.
▪ The EXEC commands available at the user level are a subset of those
available at the privileged level.
▪ User EXEC commands allow you to connect to remote devices,
change terminal settings on a temporary basic, perform basic tests,
and list system information.

❑ Ex. Router>
Privileged EXEC
• Privileged EXEC commands set operating parameters.
• The privileged command set includes those commands contained in
user EXEC mode, and also the configure command through which you
can access the remaining command modes.
• Privileged EXEC mode also includes high-level testing commands,
such as debug.

• Ex. Router#
Global configuration
• Global configuration commands apply to features that affect the
system as a whole, rather than just one protocol or interface.

• Ex. Router(Config)#
ROM monitor
• ROM monitor commands are used to perform low-level diagnostics.
• You can also use the ROM monitor commands to recover from a
system failure and stop the boot process in a specific operating
environment.
• To enter ROM monitor mode, use the Break Key (Cntl-C) during the
first 60 seconds of start-up.
• The router prompt is indicated by an angle bracket by itself or the
term ROMMON followed by a number and an angel bracket: >

• Ex: bracket: >


Interface configuration
▪ Interface configuration commands modify the operation of an
interface such as an Ethernet or serial port.
▪ Many features are enabled on a per-interface basis.
▪ Interface configuration commands always follow an interface global
configuration command, which defines the interface type.
▪ Ex. Router(config-if)#

▪ For example, enter the interface int switch 9/1 command to


configure the ATM interface.

You might also like