Nt2650.U5.Ws1.Ip Troubleshooting

In: Computers and Technology

Submitted By goofygrace
Words 1729
Pages 7
IP Troubleshooting Small Group Exercise

Activity Overview:
This is a small group activity consisting of an IP troubleshooting exercise consisting of five scenario based questions. The exercise begins with a review of a recommend IP troubleshooting procedure and continues with five scenario based questions.

Simplified IP Troubleshooting Procedures:
Host:
* Verify layer-1 and layer-2 * Physical connectivity to the host to connected. Ethernet connection should indicate electrical connectivity with some type of LED indicator light. * Verify OS detecting network interface correctly by verifying drivers installed correctly and OS display the interface as “connected” * If you have access to switching infrastructure ensure that host is assigned to the proper VLAN with the correct interface switching type (access or trunk) * Verify layer-3 * Verify IP address assignment configuration with “ipconfig /all” command on MS Windows OSs * IP address and mask correctly assigned? * Default gateway; is the host on the same IP subnet as the default gateway? * Attempt to ping default gateway, * If successful host has layer-3 connectivity to directly connection network * If unsuccessful attempt to ping other host on directly connected IP subnet * If host is having issues with pinging hosts on directly connected network, verify ARP resolution by using the command ”arp –a” command. This command displays all the dynamic ARP resolutions. If no ARP entries present the host may have hidden layer-2 issues. * Verify IP connectivity to remote networks * Review IP default gateway and static routes * “ipconfig /all” for Windows hosts for default gateway * “netstat –rn” for Window host routing table * Unit 7 will expand the troubleshooting…...

Similar Documents

U5-Ip-2002

...Unit 5 Individual Project Name:       Date:       Part 1. There are 9 animals in nine different Phyla. Be sure to look at every page. | |Animal |Phylum |Dichotomous Key (steps) |Classification | |1 |[pic][pic] |  Cnidaria      | 1b, 2a, 3b, 5b     | Class Echinoidea     | | | | |  | | |2 |[pic][pic] | Mollusca     | 1b, 2b, 6a, 7b, 11a, 12b, | Class Gastropoda     | | | | |13a     | | |3 |[pic][pic] | Annelida     | 1b, 2b, 6a, 7a, 8a    | Class Clitellata     | | | | |  | | |4 |[pic][pic] ...

Words: 551 - Pages: 3

Dhcp Troubleshooting

...DHCP Troubleshooting Each subnet can have only a single DHCP scope with a single continuous range of IP addresses. To use several address ranges within a single scope or subnet for the DHCP service, you must first define the scope and then set any required exclusion ranges. Use the entire range of consecutive IP addresses that make up the local IP subnet for which you are enabling the DHCP service. Set exclusion ranges for any IP addresses within the scope that you do not want the DHCP server to offer or use for DHCP assignment. By setting an exclusion range for these addresses, you specify that DHCP clients are never offered these addresses when they request an IP address from the server. Excluded IP addresses can be active on your network, but only by manually configuring these addresses at hosts that do not use DHCP to obtain an address. To create a new DHCP scope: 1. Open the DHCP Microsoft Management Console (MMC) snap-in. 2. In the console tree, double-click the DHCP server you want to configure. 3. Right-click IPv4 or IPv6 and then click New Scope. 4. Follow the instructions in the New Scope Wizard. Before you create the scope, determine starting and ending IP addresses to be used within it. Depending on the starting and ending IP addresses for your scope, the DHCP console suggests a default subnet mask useful for most networks. If you know a different subnet mask is required for your network, you can modify the value as needed. When you finish......

Words: 283 - Pages: 2

Unit 2: Dhcp Troubleshooting

...Unit 2: DHCP Troubleshooting Dear Junior Admin, Based on the what you have told me regarding the DHCP scope the overall corporate IP address, it sounds like you have a lease time settings which is probably set to renew ip addresses at the default times. Here is your options on what you can do with DHCP: Table 4.5 Default DHCP Options Code Option name Meaning 1 Subnet mask Specifies the subnet mask of the client subnet. This option is defined in the DHCP Manager Create Scope or Scope Properties dialog box. It cannot be set directly in the DHCP Options dialog box. 3 Router Specifies a list of IP addresses for routers on the client's subnet. Multihomed computers can have only one list per computer, not one per network adapter. 6 DNS servers Specifies a list of IP addresses for DNS name servers available to the client. 15 Domain name Specifies the DNS domain name that the client should use for DNS computer name resolution. 44 WINS/NBNS servers Specifies a list of IP addresses for NetBIOS name servers (NBNS). 46 WINS/NBT node type Allows configurable NetBIOS over TCP/IP (NetBT) clients to be configured as described in RFC 1001/1002, where 1 = b-node, 2 = p-node, 4 = m-node, and 8 = h-node. On multihomed computers, the node type is assigned to the entire computer, not to individual network adapters. 47 NetBIOS scope ID 1 Specifies a text string that is the NetBIOS over TCP/IP scope ID for the client, as specified in RFC 1001/1002. 51 Lease time ...

Words: 1115 - Pages: 5

Dhcp Troubleshooting

...at a branch office and have been tasked with changing out the DHCP scope to match the overall corporate IP address scheme. The main office assigned me an IP address range of 192.168.0.200 through 192.168.0.225. I changed the scope on Friday afternoon and came in on Monday morning to discover that only some of the workstations had picked up new leases from the new DHCP scope. Any ideas as to what may be happening, what I might check or adjust? Thank you, Junior Admin --- Dear Junior Admin, A common problem that happens more often than not is assuming as soon as DHCP options are changed that all PCs will automatically implement them. It sounds like this may be an example of that exactly. With DHCP when the computer comes online it does a broadcast search for a DHCP server. The server responds with a message offering an IP address, subnet mask, and default gateway as well as some DNS options and WINS if that is configured. Once the pc accepts it the DHCP server will send an acknowledgement message. At that point the PC will send back a message that it will take it and the DHCP server will send a message indicating that an IP address has been reserved for the lease period. At this point the PC will not contact the DHCP server again until halfway through the lease time, which is usually a default period of 8 days. If you want to force all of the PCs to grab a new IP address then you will have to go to each computer, open a DOS prompt, and do an “ipconfig/release” and......

Words: 350 - Pages: 2

Troubleshooting

...In this portion of Troubleshooting Lab A, you are the network administrator for City Power & Light (www.cpandl.com). City Power & Light has five different locations named Central, Northwest, Northeast, Southwest, and Southeast. The Central location has 500 client computers and two network servers. Each of the Northwest and Northeast locations has approximately 75 client computers and one server computer. Each of the Southwest and Southeast locations has 100 client computers and one network server. Figure 1 illustrates the company's network infrastructure. Figure 1 City Power & Light network infrastructure S1, S2, S3, S4, S5, and S6 are servers on the City Power & Light network. All of these servers run Windows Server 2008, Standard Edition. All client computers run Windows XP Professional. All computers are configured in a single workgroup named WORKGROUP. Andy Ruth, director of City Power & Light, asks you to design an Active Directory infrastructure for the company. He wants everyone to have single sign-on capabilities to every server in the network. He tells you that all users use the same applications and have roughly equivalent configurations. He thinks that the 56 Kbps links are a little slow for the company, and he wants to have control over traffic sent across those links. However, the T-1 links can handle more traffic without a problem. Andy tells you that no special security needs require isolating any of the remote locations from the central...

Words: 415 - Pages: 2

Troubleshooting Pumps

...Troubleshooting Checklist for Pumps and Control Panels |PUMP OPERATION | |PROBLEM |POSSIBLE CAUSE |REMEDY | |Pump will not start. |No power to motor. |Check for blown fuse or open circuit breaker. | | |Selector switch may be off. |Turn to "On" position. | | |Control circuit breaker may be tripped. |Reset the circuit breaker. | | |Overload heater in starter may be tripped. |Push to reset. | | |Overload heater in starter may be burnt out. |Replace the heater. | |Pump will not start and overload heaters |May be improperly grounded. |Turn power off and check motor leads with megger or | |trip. |Motor windings may be imbalanced. |ohmmeter. | | |Impeller may be clogged, blocked, or damaged. |Check resistance of motor windings. If three-phase, | | ...

Words: 976 - Pages: 4

Troubleshooting

...TROUBLESHOOTING Common Windows errors and how to fix them I have problems in Windows after installing new software Issue I have problems in Windows after installing new software. Cause After installing any utility, driver, or other software program you can encounter an almost endless list of issues that can be caused by any of the below reasons. 1. Confliction with other software installed on the computer. 2. Issue with program. 3. Improper installation or problems with installation. Solution Reinstall or uninstall the program If you're encountering problems with your computer or other programs after installing new software on your computer, uninstall the program and see if the issues persist. • Uninstalling Windows software. After the program has been uninstalled try installing the program again. • How to install a software program. Note: If after installing a program you're unable to boot into Windows, try booting into Safe Mode. Check for software program updates or new versions If you continue to experience issues verify that the program, game, or utility you're installing doesn't have any updates by visiting the developer of the program website. If you're installing a software program or drivers for a hardware device such as a printer. Get the latest software and drivers from the manufacturer instead of using the included software. A listing of links to drivers can be found on our drivers page. How do I fix illegal......

Words: 2688 - Pages: 11

Dhcp Troubleshooting

...Assignment 1. DHCP Troubleshooting Dear Junior Administrator, I would start by rechecking your initial configurations to make sure the setting were saved. Once that is done, check to see if the workstations have picked up a new lease or not. If that doesn’t resolve the issue, did you check to make sure the server is up and operational? Have any Error messages or pop up’s appear with any type of warning, if so what did it say? Once the server has been checked, if it is working properly we will check these three common problems; 1. “The client might be configured to use an IP address not provided by the server. 2. The server sends a negative response back to the client, and the client displays an error message or popup indicating that a DHCP server could not be found. 3. The server leases the client an address but the client appears to have other network configuration–based problems, such as the inability to register or resolve DNS or NetBIOS names, or to perceive computers beyond its same subnet.”(Troubleshooting DHCP) On the chance that the DHCP server is off I would like you to follow these steps to try to restart the DHCP server. 1. “Start Windows Server, and log on under an account with Administrator rights. 2. At the command prompt, type net start dhcpserver , and then press ENTER. As a helpful tool Use Event Viewer in Administrative Tools to find the possible source of problems with DHCP services.”(Troubleshooting DHCP) I hope some......

Words: 311 - Pages: 2

Dhcp Troubleshooting

...DHCP Troubleshooting Dear IT Admin: I am working at a branch office and have been tasked with changing out the DHCP scope to match the overall corporate IP address scheme. The main office assigned me an IP address range of 192.168.0.200 through 192.168.0.225. I changed the scope on Friday afternoon and came in on Monday morning to discover that only some of the workstations had picked up new leases from the new DHCP scope. Any ideas as to what may be happening what I might check or adjust? Thank you, Junior Admin From IT Admin: To: Junior Admin: A scope must be defined and activated before DHCP clients can use the DHCP server for dynamic TCP/IP configuration. DHCP servers do not communicate scope information with each other, you must be careful to define scopes so that multiple DHCP servers are not assigning the same IP address to multiple clients or assigning addresses that are statically assigned to existing IP hosts. A DHCP server can only service requests for a scope that has a network ID that is the same as the network ID of its IP address. Use the display dhcp server tree all command to verify that an address pool containing or residing on the same subnet as the subnet of the receiving interface’s IP address is configured. The DHCP server assigns IP addresses with leases (support for lease duration depends on the device model). If an IP address has passed its lease duration, the DHCP server does not assign the IP address. Execute the display dhcp server......

Words: 315 - Pages: 2

Troubleshooting Electric Circuits

...Part A - Narrative and Bridge Troubleshooting Electric Circuits. Narrative I have always had an interest in finding out how all things electrical work. From a very young age I started to fix things electrical around the house and started hooking up house and car stereos and recievers. Once I got my first computer I st had to know how it worked. So I took it apart and ending up trashing it. But that fine day my interest in circuits and circuit boards grew. As I grew older and he computers became more advanced, I knew things could short out more and I had to learn how o fix these things. So I started to study and look into the details of these electronics and how they worked. I wanted to know how these things worked and if something went wrong could I fix it. Most importantly I could get a better understanding of why the circuit fired. It was a lot of fun figuring out and fixing the problem myself. When listening to music that had a little too much wattage hook up to it, or the sub woofers was too much wattage and had fried all the speaker channels. I had to order new channels and fuses, the fuses where easy to install but taking everything apart to get to the channels on this kind of old school reciever was a little difficult. BRIDGE What I would like to learn more about is the fault point of an electrical circuit in different items. And what are the symptoms of the failure? I know that if you over-clock a computers processor to much it will......

Words: 972 - Pages: 4

Best Practices for Network Troubleshooting

...Best Practices for Network Troubleshooting Valance Baltimore NTC/405 July 27, 2015 Bradley Rush Best Practices for Network Troubleshooting The article that I found is titled Top 10 Basic Network Troubleshooting Tools Every IT Pro Should Know (2011). This article list ten basic troubleshooting tips that could help an IT professional determine the reason for a failed network connection. Let’s start with the most commonly used network tool, Ping. The Ping utility is used to provide a connectivity test between the requesting host and the destination host. Ping is done through the Internet Control Message Protocol (ICMP), by sending an echo packet to a destination host and then listens for a response from that host. This utility is used to help determine where the connection problem may be, in the office or within the network provider’s network. After the Ping utility has been performed to determine the basic connectivity, and then typically the next step would be the tracert/traceroute utility is used. This utility can determine the path to the destination host and the route the packet takes to get there, and the response time of the intermediate host. Tracert is window based and traceroute is Linux based. According to Wilkins (2011) one of the most important things that must be completed when troubleshooting a network is to find out the specific IP configuration of the affected hosts. If the address is configured statically you may already know this information, but...

Words: 541 - Pages: 3

Troubleshooting Assignment

...Troubleshooting Assignment 1 Troubleshooting Scenarios In the real world, practical problems often can be solved in multiple ways.  Provide thoughtful solutions to each of the following problems using available resources, such as articles on the web or in print, blogs, podcasts, videos, user guides, other individuals and electronics and computer stores.  Respond to each scenario with at least 3 solutions.  The response should be written in paragraph from, and should provide detailed instructions for the user to solve the problem.  1. Computer Cannot Boot You recently purchased a computer from a friend.  When you turn on the computer, a message displays that says, “Operating system not found” What steps will you take before calling technical support? 2. Poor Computer Performance Your friend sends you an email message stating that her computer is running slowly.  She asks if you know of any programs that are included with Windows that will help increase her computer’s performance.  How will you respond? 3. Maximum CPU Usage Because your computer is performing slowly, you start the Windows Task Manager to investigate.  You see that the CPU usage is near 100%.  You are not aware of any other programs currently running.  What might be causing this? 4. Password Required After turning on your computer, it prompts you to type a password to continue the boot process; however, you forgot the password.  What are your next steps to allow the computer to......

Words: 299 - Pages: 2

Nt2640

...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network,......

Words: 22068 - Pages: 89

Troubleshooting

...Gabriel Stoecker NT2640/ Thursday Troubleshooting Procedures ITT Institute Virtual Library; Method and System for performing simplified troubleshooting procedures to isolate connectivity problems. “Initializing the proxy client module with the identity of a VLAN on which the client computer is connected and which an IP address of the end station in a network, with the client IP address and client MAC address, the identity of the VLAN and the IP address of the end station provided by a remote computer coupled to the third port of the switch; disabling the first port of the switch; with the proxy client module having a logical interference with the VLAN and utilizing the IP address of the end station in the network. The client IP and client MAC addresses and the identity of VLAN provided by the remote computer to: 1) assign the client IP address + MAC addresses to the logical interface with VLAN 2) Run a sequence of connectivity tests with the end station when the first port is disabled. 3) Reporting the result of the sequence of connectivity to facilitate identification of the reasons packets are being dropped; a) Determining whether the connectivity problem is on the switch or on a link in the switch b) Identify the reason for the packets being dropped c) Identify two features responsible for dropping the packets, such as failure to respond to Address Resolution Protocol (ARP)” How Tracert Works It uses ICMP Internal Control Message......

Words: 885 - Pages: 4

Nt2650 Project Part 2

...all times. D. Define strict access control policies and procedures with second level identity checks for sensitive systems OS AND APPLICATION MAINTENANCE: (Required) Operating systems and applications must be maintained by the department at the most recent stable version that is compatible with the system’s hardware and function, and critical security patches must be applied. Systems with operating systems or applications that cannot be upgraded due to hardware or functional restrictions must be removed from network access or replaced with newer systems. LAN to WAN Security Standard A. Closing unneeded ports with a firewall to reduce the chance of unwanted network access B. Disable ping, probing, and port scanning on all exterior IP devices C. Security monitoring for intrusion detection D. Define zero-day vulnerability window definition E. Enabling content filtering and anti-virus scanning of emails F. Run all networking hardware with up to date security patches, and operating systems Wide Area Network(WAN) Security Standards A. Enforce encryption, and VPN tunneling for remote connections B. Configure routers and firewalls to block ping requests to reduce chance of DoS attacks C. Enforce strict anti-virus scanning of email attachments D. Isolate malicious software when discovered E. Deployment of redundant internet connections to maximize availability Remote Access Security Standards A. Establish strict user password policies, as well as......

Words: 1956 - Pages: 8

Animation | Kahin Pyaar Na Ho Jaaye | Jock 8708