< Return to Video

Network Troubleshooting Methodology - CompTIA Network+ N10-007 - 5.1

  • 0:02 - 0:03
    When you're troubleshooting complex
  • 0:03 - 0:05
    network problems, you may find that the
  • 0:05 - 0:07
    resolution is not as obvious as you
  • 0:07 - 0:09
    might hope. In this video, we're going to
  • 0:09 - 0:12
    step through a methodology that should
  • 0:12 - 0:14
    help you troubleshoot any problem you
  • 0:14 - 0:17
    run into. This is the flowchart of that
  • 0:17 - 0:19
    network troubleshooting methodology, and
  • 0:19 - 0:21
    we're going to step through each section
  • 0:21 - 0:23
    of this flow and describe how it can
  • 0:23 - 0:25
    help you solve those really difficult
  • 0:25 - 0:28
    problems. The first thing you want to do
  • 0:28 - 0:30
    is identify the problem. This may not be
  • 0:30 - 0:32
    as straightforward as you might think.
  • 0:32 - 0:34
    We first need to collect as much
  • 0:34 - 0:36
    information as possible about the issue
  • 0:36 - 0:38
    that's occurring. In the best possible
  • 0:38 - 0:40
    scenario, you'll be able to duplicate
  • 0:40 - 0:42
    this problem on demand. This will help
  • 0:42 - 0:44
    later as we go through a number of
  • 0:44 - 0:46
    testing phases to make sure that we are
  • 0:46 - 0:48
    able to resolve this issue. When a
  • 0:48 - 0:50
    problem happens on the network, it
  • 0:50 - 0:53
    usually affects more than one device, and
  • 0:53 - 0:55
    sometimes it affects those devices in
  • 0:55 - 0:57
    different ways. You want to be sure to
  • 0:57 - 0:59
    document all of the symptoms that may be
  • 0:59 - 1:01
    occurring. Even if they are very
  • 1:01 - 1:03
    different between different devices, you
  • 1:03 - 1:05
    may find that a single problem is
  • 1:05 - 1:07
    causing all of these different systems
  • 1:07 - 1:10
    across these different devices. Many
  • 1:10 - 1:12
    times, these issues will be identified by
  • 1:12 - 1:14
    the end users, so they may be able to
  • 1:14 - 1:16
    provide you with a lot more detail about
  • 1:16 - 1:18
    what's really happening. You should
  • 1:18 - 1:19
    question your users to find out what
  • 1:19 - 1:21
    they're seeing and if any error messages
  • 1:21 - 1:23
    are appearing. In this course, we've
  • 1:23 - 1:25
    already discussed the importance of the
  • 1:25 - 1:27
    change control process and knowing
  • 1:27 - 1:29
    exactly what is changing in your
  • 1:29 - 1:31
    environment. Without some type of formal
  • 1:31 - 1:33
    change control process, someone may be
  • 1:33 - 1:35
    able to make an unscheduled change that
  • 1:35 - 1:37
    would affect many different people. So,
  • 1:37 - 1:39
    when an error or network problem occurs,
  • 1:39 - 1:42
    you may want to find out what the
  • 1:42 - 1:44
    last thing was that changed on this network
  • 1:44 - 1:45
    that could have affected all of these
  • 1:45 - 1:48
    users. There's also going to be times
  • 1:48 - 1:50
    when you're examining a number of
  • 1:50 - 1:52
    different problems that may not actually
  • 1:52 - 1:54
    be related to each other. It's always
  • 1:54 - 1:56
    best to separate all of these different
  • 1:56 - 1:58
    issues out so that you can approach and
  • 1:58 - 2:01
    try to resolve each issue individually.
  • 2:01 - 2:03
    Now that you've collected as much
  • 2:03 - 2:05
    information as possible,
  • 2:05 - 2:07
    you can examine all of these details to
  • 2:07 - 2:10
    begin establishing a theory of what you
  • 2:10 - 2:12
    think might be going wrong. Since the
  • 2:12 - 2:14
    simpler explanation is often the most
  • 2:14 - 2:15
    likely reason
  • 2:15 - 2:18
    for the issue, that may be a good place
  • 2:18 - 2:20
    to start. But, of course, you'll want to
  • 2:20 - 2:22
    consider every possible thing that might
  • 2:22 - 2:24
    be causing this issue. Maybe start with
  • 2:24 - 2:26
    things that aren't completely obvious.
  • 2:26 - 2:28
    You could start from the top of the OSI
  • 2:28 - 2:30
    model with the way the application is
  • 2:30 - 2:32
    working and work your way to the bottom.
  • 2:32 - 2:34
    Or, you may want to start with the bottom
  • 2:34 - 2:36
    with the cabling and wiring in your
  • 2:36 - 2:38
    infrastructure and work your way up from
  • 2:38 - 2:41
    there. You'll want to list out every
  • 2:41 - 2:43
    possible cause for this problem. Your
  • 2:43 - 2:45
    list might start with the easy theories
  • 2:45 - 2:47
    at the top, but of course, include all of
  • 2:47 - 2:49
    the more complex theories in this list
  • 2:49 - 2:52
    as well. Now that we have a list of
  • 2:52 - 2:54
    theories on how to resolve this issue, we
  • 2:54 - 2:56
    can now test those theories. We may want
  • 2:56 - 2:58
    to go into a lab. And if we are able to
  • 2:58 - 3:01
    recreate this problem in the lab, then we
  • 3:01 - 3:04
    can apply each theory until we find the
  • 3:04 - 3:06
    one that happens to resolve the issue. If
  • 3:06 - 3:08
    you tried the first theory, you may want
  • 3:08 - 3:10
    to reset everything and try the second
  • 3:10 - 3:12
    theory or the third. And if you run out
  • 3:12 - 3:14
    of theories, you may want to go back and
  • 3:14 - 3:16
    think of other things that might be
  • 3:16 - 3:18
    causing this problem. This might be a
  • 3:18 - 3:19
    good time to bring in an expert who
  • 3:19 - 3:21
    knows about the application or the
  • 3:21 - 3:23
    infrastructure, and they can give some
  • 3:23 - 3:25
    theories and possible resolutions to
  • 3:25 - 3:28
    test in the lab. Once you've tested a
  • 3:28 - 3:29
    theory and found that the theory is
  • 3:29 - 3:31
    going to resolve this issue, you can then
  • 3:31 - 3:33
    begin putting together a plan of action.
  • 3:33 - 3:36
    This is how you would implement this fix
  • 3:36 - 3:38
    into a production network. You want to be
  • 3:38 - 3:40
    sure that you're able to do this with a
  • 3:40 - 3:42
    minimum amount of impact to the
  • 3:42 - 3:44
    production network. And sometimes, you
  • 3:44 - 3:46
    have to do this after hours when nobody
  • 3:46 - 3:48
    else is working on the network. You want
  • 3:48 - 3:50
    to be able to implement this with a
  • 3:50 - 3:52
    minimum amount of impact to production
  • 3:52 - 3:54
    traffic. So often, you'll have to do this
  • 3:54 - 3:57
    after hours. A best practice is to
  • 3:57 - 4:00
    document the exact steps that will be
  • 4:00 - 4:01
    required to solve this particular
  • 4:01 - 4:04
    problem. If it's replacing a cable, then
  • 4:04 - 4:05
    the process will be relatively
  • 4:05 - 4:07
    straightforward. But if you're upgrading
  • 4:07 - 4:09
    software in a switch, a router, or a
  • 4:09 - 4:12
    firewall, there may be additional tasks
  • 4:12 - 4:14
    involved in performing this plan of
  • 4:14 - 4:16
    action. You'll also want some
  • 4:16 - 4:18
    alternatives if your plan doesn't go as
  • 4:18 - 4:20
    designed. For example, you may run into
  • 4:20 - 4:22
    problems when upgrading the software in
  • 4:22 - 4:24
    a firewall. So, you may need an additional
  • 4:24 - 4:26
    firewall or a way to roll back to the
  • 4:26 - 4:27
    previous version.
  • 4:27 - 4:29
    Now that you've
  • 4:29 - 4:30
    documented your plan of action, you can
  • 4:30 - 4:32
    take that to your change control team,
  • 4:32 - 4:34
    and they can give you a window when you
  • 4:34 - 4:36
    can implement that change. The actual
  • 4:36 - 4:38
    fixing of the issue is probably going to
  • 4:38 - 4:41
    be during off hours, during non-production
  • 4:41 - 4:42
    times, and you may need to
  • 4:42 - 4:44
    bring in other people to assist,
  • 4:44 - 4:47
    especially if your window is very small.
  • 4:47 - 4:49
    Once you have executed on your plan of
  • 4:49 - 4:51
    action, your job isn't done yet.
  • 4:51 - 4:53
    We need to make sure that all of these
  • 4:53 - 4:55
    changes actually resolve the problem. So,
  • 4:55 - 4:57
    now that the changes have been
  • 4:57 - 4:59
    implemented, we now need to perform some
  • 4:59 - 5:01
    tests. We may want to bring in the end
  • 5:01 - 5:03
    users who first experienced this problem
  • 5:03 - 5:06
    so that they can run through exactly the
  • 5:06 - 5:08
    same scenario to tell you if the problem
  • 5:08 - 5:11
    is resolved or if the problem still exists.
  • 5:11 - 5:12
    This might also be a good time to
  • 5:12 - 5:14
    implement some preventive measures. That
  • 5:14 - 5:16
    way, we can either be informed that the
  • 5:16 - 5:18
    problem is occurring, or we can provide
  • 5:18 - 5:21
    alternatives that we can implement if
  • 5:21 - 5:24
    that problem happens again. After the
  • 5:24 - 5:25
    problem has been resolved, this is a
  • 5:25 - 5:27
    perfect time to document the entire
  • 5:27 - 5:30
    process from the very beginning to the
  • 5:30 - 5:32
    very end. You'll, of course, want to
  • 5:32 - 5:33
    provide as much information as possible.
  • 5:33 - 5:36
    So, if somebody runs into this issue
  • 5:36 - 5:38
    again, they can simply search your
  • 5:38 - 5:40
    knowledge base, find that particular error
  • 5:40 - 5:42
    that popped up, and know exactly the
  • 5:42 - 5:45
    process you used to solve this last time.
  • 5:45 - 5:48
    Many organizations have a help desk with
  • 5:48 - 5:49
    case notes that they can reference, or
  • 5:49 - 5:51
    you might have a separate knowledge base
  • 5:51 - 5:53
    or wiki that you create where you're
  • 5:53 - 5:54
    storing all of this important
  • 5:54 - 5:57
    information for the future. A document
  • 5:57 - 5:59
    that was created a number of years ago
  • 5:59 - 6:01
    but still shows the importance of
  • 6:01 - 6:03
    keeping this documentation over time is
  • 6:03 - 6:04
    from Google Research, where they
  • 6:04 - 6:07
    documented the failure trends in a large
  • 6:07 - 6:09
    disk drive population. And because they
  • 6:09 - 6:11
    were keeping extensive data over a long
  • 6:11 - 6:14
    period of time, they were able to tell
  • 6:14 - 6:16
    when a drive was starting to fail based
  • 6:16 - 6:18
    on the types of errors that they were
  • 6:18 - 6:20
    receiving. Being able to store all of
  • 6:20 - 6:22
    this important information, being
  • 6:22 - 6:24
    able to go back in time to see what
  • 6:24 - 6:26
    happened, becomes a very important part
  • 6:26 - 6:29
    of maintaining a network for the future.
  • 6:29 - 6:31
    Let's summarize this troubleshooting
  • 6:31 - 6:33
    methodology. We start with gathering as
  • 6:33 - 6:35
    much information as possible, asking
  • 6:35 - 6:37
    users about what they're seeing, and
  • 6:37 - 6:40
    documenting any specific error messages.
  • 6:40 - 6:41
    Then, we want to be able to create a
  • 6:41 - 6:42
    number of
  • 6:42 - 6:44
    theories that might solve this particular
  • 6:44 - 6:47
    problem. And once we have this list, we
  • 6:47 - 6:48
    want to be able to put it in the lab and
  • 6:48 - 6:50
    try testing each one of these theories
  • 6:50 - 6:52
    until we find the one that actually
  • 6:52 - 6:55
    resolves the issue. From there, we can
  • 6:55 - 6:57
    create a plan of action and document any
  • 6:57 - 7:00
    possible problems that might occur. We
  • 7:00 - 7:01
    can then get a time to implement the
  • 7:01 - 7:04
    issue and put it into our production
  • 7:04 - 7:06
    environment. And then we can verify and
  • 7:06 - 7:08
    test and make sure that the entire
  • 7:08 - 7:11
    system is now working as expected. And, of
  • 7:11 - 7:12
    course, finally, we want to document
  • 7:12 - 7:15
    everything that we did from the very
  • 7:15 - 7:17
    beginning of our troubleshooting process
  • 7:17 - 7:19
    all the way through to the end.
Title:
Network Troubleshooting Methodology - CompTIA Network+ N10-007 - 5.1
Description:

more » « less
Video Language:
English
Duration:
07:30

English subtitles

Revisions Compare revisions