Troubleshooting Methodologies, Research Paper Example

Pages: 1

Words: 1446

Research Paper

Technical Guide

This technical guide will provide a professional exposure for facilitating the Superior financial analysts. We will demonstrate the capabilities of the tools for resolving major incidents that occurs on the network.

Internetwork Performance Monitor

The IPM is an integrated module in the Cisco tool that will facilitate the analyst to monitor the activity of networks configured on multiprotocol. SSID will be utilized for identifying unique services on the network. Likewise, the tool also ensures that the response time and accessibility of IP based network on a router to router basis. Moreover, it also calculates the response from one router to another along with the mainframe that exists in the System Network Architecture (SNA) based networks. Analysts can use the IPM to troubleshoot and perform the following activities:

  • Troubleshooting of issues by identifying the latency involving devices configured on the network
  • Utilizing the Simple Network Management Protocol (SNMP) alerts whenever a defined and configured threshold is excessive. Moreover, alerts can also be generated on establishing, re-establishing and timeouts on a connection. Furthermore, Intrusion Detection Systems will also utilize SNMP for alert generation.
  • Identifying probable issues prior to their occurrence via accumulating statistics that are utilized for modeling and predicting network topologies for the upcoming expectations.
  • Analysts can also monitor the responses and the time taken between two ends of the network.

If we elaborate the IPM module further, it can be further divided into three components i.e. IPM server, IPM application, Response Time Reporter (RTR) that is the feature of Cisco IOS.

Using the ping Commands

In order to check host reach ability of host and to configure network connectivity, use the ping command is utilized.  This ping commands can be raised from both user exec mode and privileged exec mode. Moreover, once you logged in to the router or you are admitted into the server, you are spontaneously in user exec command mode.

At the privileged level the exec commands that are available at the user level are a subset. Similarly, the user exec commands allows you to perform different functions such as

  • Connection to remote devices.
  • Change in terminal settings for temporary period.
  • Execution of simple tests.
  • Collecting system information.

On AppleTalk, The ping command is required to endorse basic network connectivity. This also includes ISO Connectionless Network Service (CLNS), IP, Novell, Apollo, VINES, DECnet, or XNS networks. Furthermore, the ping command directs Internet Control Message Protocol (ICMP) Echo messages towards IPs.  The Internet protocol that detects errors and delivers information that is significant to IP packet addressing is called as ICMP.  Moreover, if any ICMP Echo messages are received by the station it promptly directs an ICMP Echo Reply message back to the main source. In order to determine the IP header options, the extended ping command mode is used. In fact, this permits the router to implement a new broad range of test options. To arrive at the ping extended command mode, you have to enter yes at the extended commands prompt of the ping command.

Using the trace Command

The routes are suggested by the trace user exec command that helps a router’s packets to follow during their travelling towards end points. In addition, this trace restricted exec command enables the IP header options to be identified. Thus, allowing the router to accomplish another wide-ranging test options.

The trace command mechanism works by utilizing the error messages that are generated by routers. These messages are developed when a datagram surpasses its time-to-live (TTL) value. Initially, the probe datagram are directed with a TTL value of 1. For This reason, the first router is removed by the probe datagram and sends back “time exceeded” error messages. Furthermore, the trace command then directs numerous probes and demonstrations are made for each round-trip time. In fact, after each third probe, the TTL is increased by 1.  In addition, each and every outgoing packet can attain one or two error messages. The error messages might be “time exceeded” or “port unreachable”. Once the maximum TTL is achieved, the trace command dismisses the destination. Moreover, if the disturbance is occurred by user than the trance sequences escape. In order to use the trace command along with ping than the network performance is accurate under normal circumstances if compared among troubleshooting.

Using Cisco Network Management Tools

In order to implement internetwork, the Cisco suggest CiscoWorks 2000 family of management products that offer design, monitoring, and troubleshooting tools. In fact, below are some internetwork management tools that are convenient for troubleshooting internetwork complications:

  • CiscoView provides dynamic monitoring and troubleshooting functions, including a graphical display of Cisco devices, statistics, and comprehensive configuration information.
  • Internetwork Performance Monitor (IPM) empowers network engineers to proactively troubleshoot network response times utilizing real-time and historical reports.
  • The TrafficDirector RMON application, a remote monitoring tool, enables you to gather data, monitor activity on your network, and find potential problems.
  • The VlanDirector switch management application is a management tool that provides an accurate picture of your VLANs.

Cisco View

The vibrant status, statistics and widespread configuration are the core features of Cisco View. These features are utilized for Cisco internetworking procedures such as switches, routers, hubs, concentrators and access servers. In order to demonstrate Cisco devices and color-coding ports, the Cisco view encourages network management. This will enable users to understand necessary information. Below are the lists of functions:

  • Graphical displays of Cisco products from a central location, giving network managers a complete view of Cisco products without physically checking each device at remote sites.
  • A continuously updated physical view of routers, hubs, switches, or access servers in a network, regardless of physical location.
  • Updated real-time monitoring and tracking of key information and data relating to device performance, traffic, and usage, with metrics such as utilization percentage, frames transmitted and received errors, and a variety of other device-specific indicators.
  • The capability to modify configurations such as trap, IP route, virtual LAN (VLAN), and bridge configurations.

Performance Problem Review

A testing tool “network sniffer” is used for monitoring remote access communications. If there are flaws and loop holes in the communications process, testers will utilize them as sources for remote access authentication information and other data sent and received by remote access users. Live testing of remote access connections, is performed during off peak hours of the organization to limit potential disruption to employees and the remote access systems. The testing will be conducted with the administrator ID having full permission and right to perform actions and administrative tasks.

Cost

For conducting the RAS testing, a test bed is required. At least two systems are required for the testing process. One system will be the host. The second will be a remote server. Both of the system must have a modem installed. One network access server and telephone switch is required. As far as time is concerned, the testing will continue until there are no errors left. It may take a day or two depending on how many RAS servers are available in the organization.

Installation RAS on a Wireless Router

In order to install a typical RADIUS server on a router, following protocols and services are associated:

  • DHCP
  • TCP / IP
  • TKIP
  • SSID
  • WPA
  • Internet Authentication Service
  • DNS

The next step is to demonstrate RADIUS server installation on a wireless router by incorporating the above mentions protocols and services.

Figure 1.1

Figure 1.1

As shown in figure 1.1, the first step is to configure the wireless router configuration. These parameters will be considered:

  • Internet Connection type: Automatic Configuration
  • Router Name: Any
  • Host Name: Any
  • Domain Name: Any
  • MTU: Any
  • Local IP Address: Local IP address of the workstation
  • DHCP Server: Disabled for RADIUS Configuration

Figure 1.2

Figure 1.2

As shown in figure 1.2, following parameters will be considered for Basic Wireless network settings:

  • Wireless Network Mode: Mixed
  • Wireless Network Name (SSID): Type SSID
  • Wireless Channel: do not make any changes
  • Wireless SSID Broadcast : Enabled

Figure 1.3

Figure 1.3

Figure 1.3 shows the configuration of the following parameters:

  • Security Mode: Select WPA Enterprise
  • WPA Algorithms: Select TKIP
  • RADIUS Server Address: Configure IP address of the RADIUS server
  • RADIUS Port: Set the port to 1812
  • Shared-key: Configure the selected shared key
  • Key Renewal Timeout: Leave it to default

Figure 1.4

Figure 1.4

Figure 1.5

Figure 1.5

As shown in Figure 1.4 and 1.5, Right click on the RADIUS client and click on ‘New RADIUS Client’

New RADIUS Client

As shown in Fig 1.6, now select name of choice and enter IP address of the Linksys router.

Figure 1.6

Figure 1.6

As shown in Fig 1.6, the last step will be to set ‘RADIUS standard’ as the ‘Client-Vendor’ and set the shared key that will be identical to the shared key that was configured in the Linksys router. Click finish to end the wizard.

References

Intrusion detection system. (2007). Network Dictionary, , 258-258.

Service set identifier. (2007). Network Dictionary, , 435-435.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Posts

Best Practices for Group Facilitators, Power Point Presentation With Speaker Notes Example

Best Practices for Group Facilitators

Pages: 1

Words: 44

Power Point Presentation With Speaker Notes

Tool Marks May Impart Both Class and Individual Characteristics, Essay Example

The collection of physical evidence is often a significant component of a criminal investigation. Investigators gather all sorts of evidence, such as fingerprints, footprints, tire [...]

Pages: 1

Words: 202

Movie Review

A Qualitative Project Proposal, Research Paper Example

Abstract The following proposal entitled “Acceptance to the Implementation of eMAR in a Critical Care Unit: A Qualitative Proposal” will be discussing the importance of [...]

Pages: 1

Words: 5429

Research Paper

Nursing Research Utilization Project, Power Point Presentation Example

Nursing Research Utilization Project

Pages: 1

Words: 41

Power Point Presentation

Employer Sponsored Child Care, Research Paper Example

Introduction Child care is one of the most important factors in a working parents decision on the type of job, time and days needed to [...]

Pages: 1

Words: 1673

Research Paper

Trait Theory, Essay Example

In the 2002 film “Minority Report,” based on a short story by science fiction writer Phillip K. Dick, the police use the abilities of a [...]

Pages: 1

Words: 191

Essay

Best Practices for Group Facilitators, Power Point Presentation With Speaker Notes Example

Best Practices for Group Facilitators

Pages: 1

Words: 44

Power Point Presentation With Speaker Notes

Tool Marks May Impart Both Class and Individual Characteristics, Essay Example

The collection of physical evidence is often a significant component of a criminal investigation. Investigators gather all sorts of evidence, such as fingerprints, footprints, tire [...]

Pages: 1

Words: 202

Movie Review

A Qualitative Project Proposal, Research Paper Example

Abstract The following proposal entitled “Acceptance to the Implementation of eMAR in a Critical Care Unit: A Qualitative Proposal” will be discussing the importance of [...]

Pages: 1

Words: 5429

Research Paper

Nursing Research Utilization Project, Power Point Presentation Example

Nursing Research Utilization Project

Pages: 1

Words: 41

Power Point Presentation

Employer Sponsored Child Care, Research Paper Example

Introduction Child care is one of the most important factors in a working parents decision on the type of job, time and days needed to [...]

Pages: 1

Words: 1673

Research Paper

Trait Theory, Essay Example

In the 2002 film “Minority Report,” based on a short story by science fiction writer Phillip K. Dick, the police use the abilities of a [...]

Pages: 1

Words: 191

Essay