Network Support

The term network support refers to providing network services to end users. It involves tasks such as installation, maintenance, and troubleshooting. Network and system administrators, helpdesk staff and network technicians work together to provide maximum availability and seamless operations of network services. The objective is to minimize interruptions in regular work due to network downtimes. This section covers a study of troubleshooting utilities and techniques for supporting computer networks.

Network troubleshooting is an essential part of the responsibilities of a network technician. A network technician is expected to have knowledge and skills to use appropriate troubleshooting utilities to diagnose problems and find solutions. This section provides an overview of commonly used troubleshooting utilities available for troubleshooting network connectivity problems.

The tracert or traceroute utility is used to trace the route to from one host to another in a TCP/IP network. All major operating systems include this utility in one form or another. The name of the utility might differ, but the purpose is the same: to find out the path between two TCP/IP hosts. The output format of this utility differs from one operating system to another. It uses the Internet Control Message Protocol (ICMP) echo packets to trace the route to a specific destination host and reports back the results at every hop on the path.

The syntax of the traceroute command in different operating systems is as follows:

The traceroute utility offers very useful information when diagnosing connectivity problems. It provides the IP address of every router (hop) that it passes through and reports the time it takes from one hop to another. This is helpful in diagnosing the exact location of the network bottleneck or congestion.

The following example shows the output of the tracert utility when used to trace the route to the web site www.oreilly.com:

C:\ >tracert www.oreilly.com
Tracing route to www.oreilly.com [208.201.239.37]
over a maximum of 30 hops:
  1     1 ms    <1 ms    <1 ms  192.168.1.1
  2    65 ms    91 ms    88 ms  72.138.64.129
  3    25 ms    59 ms    49 ms  10.1.65.129
  4    52 ms    50 ms    65 ms  gw01.hnsn.phub.net.cable.rogers.com
[66.185.80.25]
  5    47 ms    61 ms    57 ms  gw02.mtnk.phub.net.cable.rogers.com
[66.185.81.94]
  6    68 ms   137 ms    63 ms  igw01.ny8th.phub.net.cable.rogers.com
[66.185.81.13]
  7     *        *        *     Request timed out.
  8    95 ms    76 ms    55 ms  so-2-1-0.cr1.ord1.us.nlayer.net
[69.22.142.106]
  9   116 ms   112 ms   128 ms  so-2-3-0.cr1.sfo1.us.nlayer.net
[69.22.142.78]
 10   152 ms   155 ms   108 ms  ge2-7.hr2.sfo1.us.nlayer.net [69.22.143.26]
 11   158 ms   161 ms   137 ms  sonic.ge2-3.hr2.sfo1.us.nlayer.net
[69.22.130.62
 12   131 ms   121 ms   120 ms  0.at-1-0-0.gw4.200p-sf.sonic.net
[64.142.0.186]
 13   159 ms   141 ms   118 ms  0.ge-0-1-0.gw.sr.sonic.net [64.142.0.197]
 14   146 ms   143 ms   166 ms  gig49.dist1-1.sr.sonic.net [209.204.191.30]
 15   166 ms   148 ms   115 ms  ora-demarc.customer.sonic.net
[64.142.122.36]
 16   153 ms   164 ms   146 ms  www.oreillynet.com [208.201.239.37]
Trace complete.

It is easy to interpret the results of the tracert utility. The first column shows the hop number, which is the network device that responds to the ICMP echo request. The next three columns show the roundtrip time in milliseconds that the packet takes. The next column shows the hostname and the IP address of the responding device.

In some situations, the network is congested. This is shown as Request Timed Out in the output. This may be due to a misconfigured router at the seventh hop. But the trace continues to the next hop until it reaches the destination. Once the problem device is identified, you may use some other utility, such as ping, to pinpoint the source of the issue.

The following is an example of an unsuccessful attempt to trace route to the web site comptia.org. Notice that after tracing the route up to 13 hops, the ICMP echo request is being timed out. In other words, the tracert utility has failed to get a response from the next hop device.

C:\ >tracert comptia.org
Tracing route to comptia.org [208.252.144.4]
over a maximum of 30 hops:
  1    <1 ms    <1 ms    <1 ms  192.168.1.1
  2    30 ms    29 ms    29 ms  72.138.64.129
  3    24 ms    29 ms    29 ms  10.1.65.129
  4    28 ms    29 ms    29 ms  gw01.nmkt.phub.net.cable.rogers.com
[66.185.80.109]
  5    27 ms    29 ms    29 ms  gw01.mtpk.phub.net.cable.rogers.com
[66.185.81.213]
  6    28 ms    27 ms    29 ms  66.185.80.46
  7    41 ms    35 ms    40 ms  igw01.chcrmk.phub.net.cable.rogers.com
[66.185.80.201]
  8    51 ms    54 ms    53 ms  so-4-3-0.mpr1.ord7.us.above.net
[64.124.11.21]
  9    56 ms    57 ms    60 ms  above-oc12.ord.ALTER.net [64.125.12.246]
 10    59 ms    59 ms    62 ms  0.so-5-2-0.XL2.CHI2.ALTER.NET [152.63.68.6]
 11    68 ms    60 ms    64 ms  0.so-7-0-0.XL2.CHI1.ALTER.NET
[152.63.64.137]
 12    64 ms    58 ms    60 ms  POS7-0.GW4.CHI1.ALTER.NET [152.63.68.233]
 13   224 ms   226 ms   219 ms  Comptia-chi-gw.customer.ALTER.NET
[157.130.102.146]
 14     *        *        *     Request timed out.
 15     *        *        *     Request timed out.
 16     *        *        *     Request timed out.
 17     *        *        *     Request timed out.

The ping utility is used to test connectivity between two TCP/IP hosts. Like the tracert utility, it also uses ICMP echo requests to the destination host. This utility is a part of the TCP/IP protocol suite and is installed by default on all TCP/IP devices. Ping can quickly determine whether the host is connected or not and how long it takes for the request to take the roundtrip. Aside from testing connectivity, the ping command can also be used to test whether the name resolution is working.

On Windows XP/2000/2003 computers, the ping command sends out four ICMP echo packets by default. The following is an example of a successful ping command:

C:\ >ping www.google.com
Pinging www.l.google.com [72.14.207.99] with 32 bytes of data:
Reply from 72.14.207.99: bytes=32 time=20ms TTL=246
Reply from 72.14.207.99: bytes=32 time=24ms TTL=246
Reply from 72.14.207.99: bytes=32 time=19ms TTL=246
Reply from 72.14.207.99: bytes=32 time=22ms TTL=246
Ping statistics for 72.14.207.99:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 19ms, Maximum = 24ms, Average = 21ms

When you use the ping utility to diagnose network problems, you must be able to interpret the output correctly in order to find out the exact cause of the problem. The following are some of the common output messages that you must be able to understand:

Request Timed Out

A Request Timed Out message indicates that the echo request message did not get any response from the destination host. The destination device might not be connected to the network, be powered down, or configured correctly. It may also mean that the destination host does not exist, and you might be using an incorrect address with the ping command. Some intermediate device on the path may also not be functioning. The code that follows is an example of this message.

Pinging 192.168.0.2 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 192.168.0.2:
    Packets: Sent = 4, Received = 0, Lost = 4 (100% loss)
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms
Destination Host Unreachable

The Destination Host Unreachable error message appears in the ping output when the host you are trying to ping is not found. Check that the local host is correctly configured with the IP address of the default gateway. The following is an example of this error message. Note that the ping statistics are similar to the Request Timed Out message.

Pinging 192.168.0.2 with 32 bytes of data:
Destination host unreachable.
Destination host unreachable.
Destination host unreachable.
Destination host unreachable.
Ping statistics for 192.168.0.2:
    Packets: Sent = 4, Received = 0, Lost = 4 (100% loss
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms
Unknown Host

The Unknown Host error message means that the specified hostname could not be resolved. This problem is associated with the DNS. Check that the DNS server address is correctly configured on the local host and the DNS server is online and connected to the network. This may also mean that the HOSTS file is not correctly configured on the local host. In this situation, you might need to use another utility, such as nslookup or dig, to find out the exact problem. The following is an example of this message:

C:\>ping www.mydomain.com
Unkown host www.mydomain.ca
TTL Expired

Each ping command is executed with a default Time-To-Live (TTL) value. Each time the ping echo message encounters a network device, the TTL value is subtracted by 1. The purpose of the TTL is to prevent the echo message from looping around different network devices. The TTL Expired error message means that the echo message sent to the destination could not get a response, and the TTL value is reduced to 0. This indicates a routing problem on the network. On Windows operating systems, you can use the ping -i command to increase the TTL value to a maximum of 255. The following is an example of this message:

Reply from 192.168.0.2: TTL Expired in transit.

ping is one of the most frequently used troubleshooting utilities, which is available in all implementations of the TCP/IP networks. When diagnosing a connectivity problem with ping, the following steps should be taken:

If these steps do not resolve the problem, you might have to use other TCP/IP diagnostic utilities.

The arp is used to resolve an IP address to the MAC address. The arp is a command-line utility that can be used to diagnose address resolution problems. Hosts on TCP/IP networks use IP addresses to communicate to each other. IP addresses are further resolved to their MAC addresses in order to deliver IP packets to the correct host. These MAC addresses are temporarily stored on the local host in the ARP cache. The ARP cache is a table that maps recently resolved IP addresses and their corresponding MAC addresses. It is periodically refreshed with newer entries, and older entries are deleted. Whenever a host needs to send a packet to another host, it first checks its local ARP cache before sending a broadcast message on the local network.

There are two types of entries in the ARP cache: dynamic and static. The dynamic entries are created automatically as the local host resolves IP addresses. The static entries are added manually using the arp -s command. You can check the ARP cache of the local computer anytime by using the arp -a command the arp -g command. Here is an output of this command on a Windows XP computer:

C:\ >arp -a
Interface: 192.168.1.100 --- 0×10003
  Internet Address      Physical Address      Type
  192.168.1.1           00-40-f4-e4-48-50     dynamic

The arp command supports several parameters, as listed in Table 8-21.

The netstat utility is used to display the protocol statistics and current active TCP/IP connections on the local host. When used without using any parameters, this utility displays all inbound and outbound TCP/IP connections, as shown in the following output.

C:\ >netstat
Active Connections
Proto  Local Address    Foreign Address            State
TCP    pkb:1038         phx.gbl:1863               ESTABLISHED
TCP    pkb:1049         209.123.81.160:http        CLOSE_WAIT
TCP    pkb:1050         209.123.81.160:http        CLOSE_WAIT
TCP    pkb:1054         209.123.81.167:http        CLOSE_WAIT
TCP    pkb:1055         209.123.81.167:http        CLOSE_WAIT
TCP    pkb:4064         qb-in-f99.google.com:http  ESTABLISHED
TCP    pkb:4065         qb-in-f99.google.com:http  ESTABLISHED
TCP    pkb:4078         ns-vip2.hitbox.com:http    ESTABLISHED
TCP    pkb:4080         208.252.144.4:http         ESTABLISHED
TCP    pkb:4081         208.252.144.4:http         ESTABLISHED
TCP    pkb:4083         qb-in-f99.google.com:http  ESTABLISHED
TCP    pkb:4084         206-5.amazon.com:http      ESTABLISHED
TCP    pkb:4085         209.123.81.153:http        ESTABLISHED
TCP    pkb:4086         209.123.81.166:http        ESTABLISHED

The output includes columns such as protocol, local address and port number; foreign address (destination) and its port number; and the current state of the connection. The netstat utility includes several parameters that can be used to correctly pinpoint a specific problem with the TCP/IP connections. Table 8-22 lists different parameters available with this command.

The following examples explain how the netstat utility can be used to display the current TCP/IP activities on the local host using various parameters. While interpretation of all output statistics is beyond the scope of the Network+ exam, most of the outputs are self-explanatory.

The nbtstat utility is exclusive to Windows operating systems. It is used to display the NetBIOS over TCP/IP connection statistics. In case there is a problem with NetBIOS name resolution, the nbtstat utility comes in handy to diagnose it. Table 8-23 lists common parameters available for this command and their functions.

The following is a sample output of the nbtstat command when used with the -n parameter. The output lists the entries in the local NetBIOS name cache.

C:\ >nbtstat -n
Local Area Connection:
Node IpAddress: [192.168.1.100] Scope Id: []
                NetBIOS Local Name Table
       Name               Type         Status
    ---------------------------------------------
    PKB             <00>  UNIQUE      Registered
    WORKGROUP      <00>  GROUP       Registered
    PKB             <20>  UNIQUE      Registered
    WORKGROUP      <1E>  GROUP       Registered
    WORKGROUP      <1D>  UNIQUE      Registered

The ipconfig utility is used in Windows operating systems to display the TCP/IP configuration of the local host. It is commonly used with the /all parameter to display the configuration of all network adapters installed on the system. The following is a sample output of the ipconfig /all command:

C:\ >ipconfig /all
Windows IP Configuration
   Host Name . . . . . . . . . . . . : pkb
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Unknown
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
Ethernet adapter Local Area Connection:
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : VIA Rhine II Fast Ethernet Ada
pter
   Physical Address. . . . . . . . . : 00-0B-6A-0B-71-D8
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IP Address. . . . . . . . . . . . : 192.168.1.100
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.1.1
   DHCP Server . . . . . . . . . . . : 192.168.1.1
   DNS Servers . . . . . . . . . . . : 192.168.1.1
   Lease Obtained. . . . . . . . . . : Monday, October 02, 2006 12:40:09 PM
   Lease Expires . . . . . . . . . . : Monday, October 02, 2006 1:40:09 PM

Table 8-24 lists the parameters and their functions available with the ipconfig command.

On Windows XP, Windows 2000, and Windows Server 2003 operating systems, the ipconfig utility also includes the following parameters:

ipconfig is very useful in troubleshooting configuration problems on a TCP/IP host. The output of the ipconfig /all command can reveal one or more problem areas, and an administrator can take necessary corrective action to resolve the problem. For example, if the output does not show a valid IP address, the ipconfig /release and ipconfig /renew commands can renew the IP address of the host with the DHCP server. On a Windows XP/2000/2003 system, if the host is unable to resolve DNS names, the ipconfig /flushdns can be used to clear the DNS cache. Similarly, if the host is not able to connect to any remote hosts, the default gateway address should be checked in the output of the ipconfig command.

The nslookup utility is used to diagnose problems related to the DNS services. In other words, it is used to resolve name resolution problems. This utility can be used to perform name resolution queries against a specified DNS server or to display information about currently configured DNS servers on a local host.

Unlike other commands discussed in this section, the nslookup command can be executed in either interactive mode or noninteractive mode as explained in the following paragraphs:

The following example shows how the nslookup command can be used to resolve a hostname using the non-interactive mode:

C:\ >nslookup www.oreilly.com
Server:  localhost
Address:  192.168.1.1

Non-authoritative answer:
Name:    www.oreilly.com
Addresses:  208.201.239.36, 208.201.239.37

In case you need to resolve a hostname using a specific DNS server, you can use the following command instead:

C:\ >nslookup www.oreilly.com 192.168.1.5

You can also use nslookup to resolve IP addresses to hostnames, as shown in the following example.

C:\ >nslookup 208.201.239.36
Server:  localhost
Address:  192.168.1.1

Name:    www.oreillynet.com
Address:  208.201.239.36

When troubleshooting network connectivity problems, one of the easiest methods is to check the visual indicators on network devices. Almost every network device has some form of visual indicator that can help find out whether the device is working or not. Network interface cards, hubs, switches, and routers all have light emitting diodes (LEDs) that indicate whether the device is functioning properly or not.

Some network devices have LEDs that change color according to the condition of the device or of an interface of the device. For example, hubs and switches have LEDs on every port; the color of the LED on a port indicates the port's condition. Similarly, NICs have small LEDs that can be helpful in detecting the source of a connectivity problem.

The following list provides guidelines for diagnosing a connectivity problem depending on the status of the LED lights. Note that these status lights may vary from one manufacturer to another.

Certain devices provide separate LEDs for power, activity, and network collisions. Each of these LEDs can be a good indicator of the connectivity problem. Depending on the type and vendor of the network device used, the documentation of the device may be very helpful in understanding the meaning of LED status lights.

Remote connectivity problems include problems with connecting to a corporate network using Remote Access Services, VPN, and the Internet. When resolving remote connectivity problems, you will need to make certain basic checks to identify the problem and then find an appropriate resolution. The issue might be due to physical connectivity, permissions, authentication, incorrect protocol settings, or some device such as the wireless router. A logical approach to resolving a given problem will lead you to find a suitable corrective action. In this section, I will discuss some basic problem areas related to remote access.

Remote access connectivity problems start with physical connections involving dial-up modems, routers, cables, and connectors. Telephone lines, DSL modems, and broadband cable may also cause connectivity problems. The following is a list of some quick checks that you can make so you are able to identify the cause of the problem and take an appropriate corrective action:

Dial-up connections
DSL
Cable
Wireless Internet access

In this section, we will discuss issues related to network connectivity. Network connectivity is provided through several components of the network infrastructure. These components essentially include network services, devices, and media. We will also discuss how problems related to network topology can be resolved. Finally, we will take a look at the logical steps involved in identifying, isolating, and resolving a given network problem.

A network requires several services to function properly. These services are run on one or more network servers and include DNS, DHCP, and WINS. Network services are critical to the functioning of the entire network. Addition of, removal of, or changes made to these services have network-wide effects. You must understand how these services affect the network users if any change is made. In this section, we will discuss the effects of problems with network services.

The DHCP service is used to dynamically assign IP addresses and related configurations to TCP/IP hosts in a network. The addresses assigned by the DHCP server are valid for a certain period of time called a lease. When 50 percent of the lease period expires, the DHCP clients attempt to renew their lease with the DHCP server. When clients are added or removed from the network, the DHCP server takes care of IP address assignments.

When a DHCP client boots up for the first time, it searches for a DHCP server that can assign it an IP address configuration. Any available DHCP server can service the request. The network traffic generated by the DHCP clients and servers is negligible and is not of much concern. The longer the lease duration, the less DHCP traffic is generated by clients. In other words, if network congestion is a problem, you might consider increasing the lease duration.

If a new DHCP server is added to the network, the DHCP clients might need to be reconfigured so that they contact the right DHCP server to obtain and renew their IP addresses. On the other hand, removing the DHCP server will affect almost every client in the network. Clients will not able to obtain or renew their IP addresses. This simply means that the clients will not be able to connect to the network. If it is a small network, the clients can be configured with static IP addresses. For a large network, you might have to make an alternate DHCP server available to continue normal network functions.

The WINS service is used to resolve NetBIOS names to IP addresses. The WINS service helps reduce broadcast traffic on networks that may cause network congestion. It is exclusively used in Windows networks where NetBIOS names are used. Every time a Windows client needs to connect to a remote computer or browse the network, the WINS server is contacted to resolve the computer name to its IP address.

If the WINS server is not available, the computer might attempt to resolve the computer names using the broadcast method. Network broadcasts are not preferred in large networks as they create significant network traffic and might cause network congestion. Besides this, most routers do not forward broadcast messages in order to prevent the local broadcast traffic to cross over to other network segments. It is important to note that the WINS service itself does not generate much network traffic but instead is helpful in reducing network traffic.

As an alternative to a WINS server, Windows client computers may also use a text file named LMHOSTS to resolve NetBIOS names. Windows client computers are dynamically configured with a preferred and alternate WINS server through the DHCP server. It is also possible to manually configure client computers with WINS addresses in small networks.

It is obvious that WINS is helpful in reducing network broadcast traffic. Before removing a WINS server from the network, you must either plan to install an alternate WINS server or configure the LMHOSTS file manually on each Windows client.

When troubleshooting a network connectivity problem, the first thing you need to know is which network topology is in use. Depending on the topology, the troubleshooting methods will also vary. The following sections explain common troubleshooting methods for bus, star, ring, and mesh topologies.

Star topology is the most widely used network topology these days. In a star network, a central device called a hub or a switch provides a point-to-point connection to all devices in the network segment. The length of the cable used to connect a single device depends on the type of cable. The following are some of the common points to remember when troubleshooting connectivity problems in a star network:

The network infrastructure includes almost every component of the network. For example, hubs, switches, routers, cables, connectors, terminators, and wireless access points are all part of the network infrastructure. Although servers that provide network services such as DNS, WINS, DHCP, and RAS are also part of the network infrastructure, this section deals with troubleshooting only the physical components of the network. Given a network problem scenario, you must have a troubleshooting strategy in place.

The cables and connectors used to interconnect network devices are often the cause of a network connectivity problem. Some of the key points to remember while troubleshooting network media are as follows:

The following are some of the common problems with network devices:

The following list provides a quick review of the factors that may affect the wireless networks:

Signal strength

Wireless signals degrade as they travel away from a wireless signal-generating device, such as the access point. This degradation or attenuation of signals is caused by several environmental factors, such as EMI, RFI, or walls. The weakening of wireless signals can be prevented, to some extent, by careful location of wireless antennae, the use of signal boosters, and correct placement of wireless access points. It is good to know the maximum range of the wireless access points used in the network.

Type of wireless standards

Wireless devices come in different makes and models and conform to several standards. You must make sure that the wireless devices—such as wireless routers, access points, and adapters—all support the standards used on the network. Incompatibility of wireless standards causes connectivity issues.

SSID settings

The Service Set Identifier (SSID) enables wireless clients to connect to a wireless access point and access network resources. If a wireless client is reporting connectivity problems, wireless configuration should be checked to make sure that the client is using the correct SSID. Remember that both the access point and the wireless client should be configured with the same SSID.

Authentication

In large corporate networks, security is a prime concern, and most administrators configure certain authentication mechanisms to prevent unauthorized access to confidential company data. If a user cannot log on to a wireless network, make sure that he has sufficient permissions to log on. Additionally, confirm that the encryption and authentication settings are configured correctly on his computer. Wireless networks use WEP protocol, which supports both 64- and 128-bit encryption. Make sure that the client is configured to use the correct WEP encryption standard.

Coverage of access point

Wireless access points are like hubs or switches for the wired network. They have a limited coverage area. All wireless clients must be located within the coverage area to properly transmit and receive signals. When troubleshooting wireless client problems, you should consider factors such as the distance of the wireless client from the access point and signal attenuation due to environmental factors. Wireless repeaters and signal boosters can be used for clients who are located in distant places.

Troubleshooting network problems requires that you follow some basic logical steps. The troubleshooting process should start with identifying the problem symptoms, isolating the affected area, and so on. Following a logical procedure not only makes troubleshooting easy, but it also reduces the time it takes to resolve the problem.

The Network+ exam expects you to understand the following basic steps in resolving a network problem:

These steps are explained in the following sections.