SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Network
troubleshooting
methodology.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– The importance of a methodology.
– Seven-step troubleshooting methodology.
PACE-IT.
Page 4
Network troubleshooting methodology.
Page 5
“My methodology is not knowing
what I’m doing and making that
work for me.”
– Stone Gossard
Page 6
All networks will require
troubleshooting. If you don’t
know where to start or haven’t
developed a methodology, you
will waste time and resources.
The complexity of modern networks means that
there is a lot that can go wrong. Without a
troubleshooting methodology, your frustration levels
and the frustration levels of those you support, is
going to rise.
A systematic troubleshooting methodology can
significantly reduce the time required to resolve a
problem and close a network trouble ticket—saving
both time and other resources.
Network troubleshooting methodology.
Page 7
Network troubleshooting methodology.
Page 8
– Step one: identify the problem.
» Gather information. What is actually occurring or not occurring?
Is the problem extremely local, relegated to your network, or
out of your control?
» Identify symptoms. Remember, the symptoms are not the
problem; they just point toward the underlying issue.
» Approach multiple problems individually.
» Question the users. This needs to be done both politely and
firmly. Many problems that are reported within a network are
the result of the end user needing to be educated or re-
educated in proper procedures.
• Also, remember that most end users don’t have your level of
technical knowledge, so be patient, but don’t patronize.
» Determine if anything has changed. This also requires a
systematic approach, so be thorough.
Network troubleshooting methodology.
Page 9
– Step two: establish a theory of probable
cause.
» Make a list of all of the possible causes of the problem.
• Consider multiple approaches to the problem (e.g., from
bottom to top and then from top to bottom of the OSI model).
» Divide the list into three ranked sections of: not likely, likely,
and most likely; this provides a great place to start.
» Remember to question the obvious. If the network printer
doesn’t work, check to be sure that it is turned on.
– Step three: test the theory of probable
cause.
» If the theory is confirmed, move on to the next step.
» If the theory is proven to be incorrect, then reestablish a new
theory of probable cause.
» If you run out of probable causes, or the situation worsens, it
may be time to escalate the issue up the troubleshooting chain.
Network troubleshooting methodology.
Page 10
– Step four: establish a plan of action and
identify potential effects.
» Simple problems may require a simple plan (e.g., turn on the
network printer).
» More complex problems will require more complex plans. In
some cases, it is a good idea to write the plan out step by step
in order to determine the best course of action and to identify
any possible repercussions from the resolution.
– Step five: implement the plan or escalate.
» If you have the authority, put the plan into action.
• If you don’t have the authority, escalate the problem up the
troubleshooting chain; include all facts and determinations
when doing so.
Network troubleshooting methodology.
Page 11
– Step six: verify full system functionality.
» Don’t just verify that the original problem has gone away.
Sometimes, a fix will introduce a new issue into the system.
» If a new issue has occurred, it is time to go back to step one or
escalate the problem.
» If applicable, implement preventative measures at this step.
– Step seven: document findings, actions,
and outcomes.
» Document everything.
• This will save time if and when the problem reoccurs.
» Your documentation may lead to new best practices for your
organization.
» Documenting missteps is also important; it will keep the next
technician from making the same missteps that you may have
made.
Network troubleshooting methodology.
Page 12
Network troubleshooting methodology.
Problems will occur in every network. A well developed troubleshooting
methodology will reduce the time it takes to recover, will cause less
frustration and headaches, and may even make you a network hero.
Topic
The importance of a
methodology.
Summary
The steps are: identify the problem, establish a theory of probable cause,
test the theory, establish a plan (including any effects of the plan),
implement the plan, verify full functionality, and—as a final step—document
everything.
Seven-step troubleshooting
methodology.
Page 13
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Weitere ähnliche Inhalte

Was ist angesagt?

Christo email #4
Christo   email #4Christo   email #4
Christo email #4
Alex Fiore
 

Was ist angesagt? (20)

PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
PACE-IT: Troubleshooting Copper Wire Networks (part 2)
PACE-IT: Troubleshooting Copper Wire Networks (part 2)PACE-IT: Troubleshooting Copper Wire Networks (part 2)
PACE-IT: Troubleshooting Copper Wire Networks (part 2)
 
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.8: Risk Management Best PracticesPACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.8: Risk Management Best Practices
 
PACE-IT: Troubleshooting Fiber Cable Networks
PACE-IT: Troubleshooting Fiber Cable NetworksPACE-IT: Troubleshooting Fiber Cable Networks
PACE-IT: Troubleshooting Fiber Cable Networks
 
Pace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks WiredPace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks Wired
 
Pace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless NetworksPace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless Networks
 
PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
 
PACE-IT: Configuring Switches (part 1)
PACE-IT: Configuring Switches (part 1)PACE-IT: Configuring Switches (part 1)
PACE-IT: Configuring Switches (part 1)
 
PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Wireless LAN Infrastructure (part 2)PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Wireless LAN Infrastructure (part 2)
 
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery ConceptsPACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery Concepts
 
Pace IT - Prohibited Content and Activity
Pace IT - Prohibited Content and ActivityPace IT - Prohibited Content and Activity
Pace IT - Prohibited Content and Activity
 
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 
Pace IT - Environmental Impact and Control
Pace IT - Environmental Impact and ControlPace IT - Environmental Impact and Control
Pace IT - Environmental Impact and Control
 
Christo email #4
Christo   email #4Christo   email #4
Christo email #4
 
Abb e guide3
Abb e guide3Abb e guide3
Abb e guide3
 
PACE-IT: IT Security Measures
PACE-IT: IT Security MeasuresPACE-IT: IT Security Measures
PACE-IT: IT Security Measures
 
Pace IT - Threats & Vulnerabilities Mitigation
Pace IT - Threats & Vulnerabilities MitigationPace IT - Threats & Vulnerabilities Mitigation
Pace IT - Threats & Vulnerabilities Mitigation
 
PACE-IT: Rack and Power Management
PACE-IT: Rack and Power ManagementPACE-IT: Rack and Power Management
PACE-IT: Rack and Power Management
 

Andere mochten auch

TECH TALKWITH JAMES PRICE
TECH TALKWITH JAMES PRICETECH TALKWITH JAMES PRICE
TECH TALKWITH JAMES PRICE
James Price
 
Chapter 09 - Net Testing
Chapter 09 - Net TestingChapter 09 - Net Testing
Chapter 09 - Net Testing
phanleson
 
actix-troubleshooting-and-optimizing-umts-network
actix-troubleshooting-and-optimizing-umts-networkactix-troubleshooting-and-optimizing-umts-network
actix-troubleshooting-and-optimizing-umts-network
Rohit Joshi
 
Basic Network Concepts
Basic Network ConceptsBasic Network Concepts
Basic Network Concepts
Abhishek Singh
 
Basic Network And Hardware Troubleshooting
Basic Network And Hardware TroubleshootingBasic Network And Hardware Troubleshooting
Basic Network And Hardware Troubleshooting
sl0wupl0ads
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshooting
Jerome Luison
 

Andere mochten auch (20)

The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 
Documentation Checklist
Documentation ChecklistDocumentation Checklist
Documentation Checklist
 
TECH TALKWITH JAMES PRICE
TECH TALKWITH JAMES PRICETECH TALKWITH JAMES PRICE
TECH TALKWITH JAMES PRICE
 
Chapter 09 - Net Testing
Chapter 09 - Net TestingChapter 09 - Net Testing
Chapter 09 - Net Testing
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
Lost art of troubleshooting
Lost art of troubleshootingLost art of troubleshooting
Lost art of troubleshooting
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the network
 
In-depth Troubleshooting on NetScaler using Command Line Tools
In-depth Troubleshooting on NetScaler using Command Line ToolsIn-depth Troubleshooting on NetScaler using Command Line Tools
In-depth Troubleshooting on NetScaler using Command Line Tools
 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 
Testing and troubleshooting networks
Testing and troubleshooting networksTesting and troubleshooting networks
Testing and troubleshooting networks
 
actix-troubleshooting-and-optimizing-umts-network
actix-troubleshooting-and-optimizing-umts-networkactix-troubleshooting-and-optimizing-umts-network
actix-troubleshooting-and-optimizing-umts-network
 
Basic Network Concepts
Basic Network ConceptsBasic Network Concepts
Basic Network Concepts
 
VMware vSphere Performance Troubleshooting
VMware vSphere Performance TroubleshootingVMware vSphere Performance Troubleshooting
VMware vSphere Performance Troubleshooting
 
Basic Troubleshooting Pwr Pt
Basic Troubleshooting Pwr PtBasic Troubleshooting Pwr Pt
Basic Troubleshooting Pwr Pt
 
Network topology
Network topologyNetwork topology
Network topology
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Basic Network And Hardware Troubleshooting
Basic Network And Hardware TroubleshootingBasic Network And Hardware Troubleshooting
Basic Network And Hardware Troubleshooting
 
Guided media and Unguided media
Guided media and Unguided mediaGuided media and Unguided media
Guided media and Unguided media
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshooting
 

Ähnlich wie PACE-IT: Network Troubleshooting Methodology

Va root cause analysis for process improvement
Va root cause analysis for process improvementVa root cause analysis for process improvement
Va root cause analysis for process improvement
sourias
 
QM-021-PDCA
QM-021-PDCAQM-021-PDCA
QM-021-PDCA
handbook
 
Concerns Examiners Have About Your Spreadsheets and How to Respond
Concerns Examiners Have About Your Spreadsheets and How to RespondConcerns Examiners Have About Your Spreadsheets and How to Respond
Concerns Examiners Have About Your Spreadsheets and How to Respond
Libby Bierman
 
Student Assestment Questionnaire
Student Assestment QuestionnaireStudent Assestment Questionnaire
Student Assestment Questionnaire
Michael Mendoza
 

Ähnlich wie PACE-IT: Network Troubleshooting Methodology (20)

Pace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best PracticesPace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best Practices
 
Cause and effect diagrams
Cause and effect diagramsCause and effect diagrams
Cause and effect diagrams
 
PACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related ConceptsPACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related Concepts
 
Pace IT - Troubleshooting OS part 1
Pace IT - Troubleshooting OS part 1Pace IT - Troubleshooting OS part 1
Pace IT - Troubleshooting OS part 1
 
Process Troubleshooting
Process TroubleshootingProcess Troubleshooting
Process Troubleshooting
 
Problem Solving1.pptx
Problem Solving1.pptxProblem Solving1.pptx
Problem Solving1.pptx
 
Usability Primer - for Alberta Municipal Webmasters Working Group
Usability Primer - for Alberta Municipal Webmasters Working GroupUsability Primer - for Alberta Municipal Webmasters Working Group
Usability Primer - for Alberta Municipal Webmasters Working Group
 
Systems development life cycle
Systems development life cycleSystems development life cycle
Systems development life cycle
 
Pace IT - Troubleshooting Security
Pace IT - Troubleshooting SecurityPace IT - Troubleshooting Security
Pace IT - Troubleshooting Security
 
Va root cause analysis for process improvement
Va root cause analysis for process improvementVa root cause analysis for process improvement
Va root cause analysis for process improvement
 
Qcl 14-v3 [cause effect diagram]-[banasthali vidhyapith]_[aparna agnihotri]
Qcl 14-v3 [cause effect diagram]-[banasthali vidhyapith]_[aparna agnihotri]Qcl 14-v3 [cause effect diagram]-[banasthali vidhyapith]_[aparna agnihotri]
Qcl 14-v3 [cause effect diagram]-[banasthali vidhyapith]_[aparna agnihotri]
 
QM-021-PDCA
QM-021-PDCAQM-021-PDCA
QM-021-PDCA
 
PDCA
PDCAPDCA
PDCA
 
Concerns Examiners Have About Your Spreadsheets and How to Respond
Concerns Examiners Have About Your Spreadsheets and How to RespondConcerns Examiners Have About Your Spreadsheets and How to Respond
Concerns Examiners Have About Your Spreadsheets and How to Respond
 
PepsiCo Decision Support System
PepsiCo Decision Support SystemPepsiCo Decision Support System
PepsiCo Decision Support System
 
Fishbone analysis
Fishbone analysisFishbone analysis
Fishbone analysis
 
Advice On IT Implementations
Advice On IT ImplementationsAdvice On IT Implementations
Advice On IT Implementations
 
Student Assestment Questionnaire
Student Assestment QuestionnaireStudent Assestment Questionnaire
Student Assestment Questionnaire
 
Rinse and Repeat : The Spiral of Applied Machine Learning
Rinse and Repeat : The Spiral of Applied Machine LearningRinse and Repeat : The Spiral of Applied Machine Learning
Rinse and Repeat : The Spiral of Applied Machine Learning
 
PACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+ 2.5: Incident Response ConceptsPACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+ 2.5: Incident Response Concepts
 

Mehr von Pace IT at Edmonds Community College

Mehr von Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Kürzlich hochgeladen

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

PACE-IT: Network Troubleshooting Methodology

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – The importance of a methodology. – Seven-step troubleshooting methodology. PACE-IT.
  • 5. Page 5 “My methodology is not knowing what I’m doing and making that work for me.” – Stone Gossard
  • 6. Page 6 All networks will require troubleshooting. If you don’t know where to start or haven’t developed a methodology, you will waste time and resources. The complexity of modern networks means that there is a lot that can go wrong. Without a troubleshooting methodology, your frustration levels and the frustration levels of those you support, is going to rise. A systematic troubleshooting methodology can significantly reduce the time required to resolve a problem and close a network trouble ticket—saving both time and other resources. Network troubleshooting methodology.
  • 8. Page 8 – Step one: identify the problem. » Gather information. What is actually occurring or not occurring? Is the problem extremely local, relegated to your network, or out of your control? » Identify symptoms. Remember, the symptoms are not the problem; they just point toward the underlying issue. » Approach multiple problems individually. » Question the users. This needs to be done both politely and firmly. Many problems that are reported within a network are the result of the end user needing to be educated or re- educated in proper procedures. • Also, remember that most end users don’t have your level of technical knowledge, so be patient, but don’t patronize. » Determine if anything has changed. This also requires a systematic approach, so be thorough. Network troubleshooting methodology.
  • 9. Page 9 – Step two: establish a theory of probable cause. » Make a list of all of the possible causes of the problem. • Consider multiple approaches to the problem (e.g., from bottom to top and then from top to bottom of the OSI model). » Divide the list into three ranked sections of: not likely, likely, and most likely; this provides a great place to start. » Remember to question the obvious. If the network printer doesn’t work, check to be sure that it is turned on. – Step three: test the theory of probable cause. » If the theory is confirmed, move on to the next step. » If the theory is proven to be incorrect, then reestablish a new theory of probable cause. » If you run out of probable causes, or the situation worsens, it may be time to escalate the issue up the troubleshooting chain. Network troubleshooting methodology.
  • 10. Page 10 – Step four: establish a plan of action and identify potential effects. » Simple problems may require a simple plan (e.g., turn on the network printer). » More complex problems will require more complex plans. In some cases, it is a good idea to write the plan out step by step in order to determine the best course of action and to identify any possible repercussions from the resolution. – Step five: implement the plan or escalate. » If you have the authority, put the plan into action. • If you don’t have the authority, escalate the problem up the troubleshooting chain; include all facts and determinations when doing so. Network troubleshooting methodology.
  • 11. Page 11 – Step six: verify full system functionality. » Don’t just verify that the original problem has gone away. Sometimes, a fix will introduce a new issue into the system. » If a new issue has occurred, it is time to go back to step one or escalate the problem. » If applicable, implement preventative measures at this step. – Step seven: document findings, actions, and outcomes. » Document everything. • This will save time if and when the problem reoccurs. » Your documentation may lead to new best practices for your organization. » Documenting missteps is also important; it will keep the next technician from making the same missteps that you may have made. Network troubleshooting methodology.
  • 12. Page 12 Network troubleshooting methodology. Problems will occur in every network. A well developed troubleshooting methodology will reduce the time it takes to recover, will cause less frustration and headaches, and may even make you a network hero. Topic The importance of a methodology. Summary The steps are: identify the problem, establish a theory of probable cause, test the theory, establish a plan (including any effects of the plan), implement the plan, verify full functionality, and—as a final step—document everything. Seven-step troubleshooting methodology.
  • 14. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.