Preview

Network Troubleshooting

Powerful Essays
Open Document
Open Document
1543 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Troubleshooting
Introduction
If you've ever been a network administrator, the call you dread the most might be one you receive in the middle of the night by some panicked employee stating that a portion of your critical network has gone down. What troubleshooting options are available to provide answers to your network problem? Besides having a proactive helpdesk that can "read" the mind of your network, an important part of troubleshooting involves using a network protocol analyzer. If you've done your research, you realize that there are many choices on the market today that may satisfy your needs but make a dent your company's pocket book. Plus, you have to factor in training your helpdesk on how to use this new tool and if it will provide some type of return on investment (ROI).
After conducting a thorough research of tools to analyze and troubleshoot a network, we decided to use Ethereal. Many versions such a Sniffer® Portable by Network General and Observer® by Network Instruments provided more options but were only available in "demo" versions and didn't provide full functionality. Since we wanted to use Tcpdump as one of the tools in our network troubleshooting arsenal, it made sense to run Ethereal since it supports this type of filter.
So, what is Ethereal?
Ethereal is a network analyzer. It has the ability to read packets from a network, decipher them, and then display the results with a very intuitive GUI. According to the book Ethereal Packet Sniffing, "the most important aspects of Ethereal are as follows: that it is open source, actively maintained, and free". After conducting thorough research, Ethereal also supports TcpDump format capture filters, supports over 700 protocols (new ones are added on a regular basis), and the tool can capture data from Ethernet, Token Ring, 802.11 Wireless, etc. For anyone interested in a command line interface (CLI) interface for Ethereal, you're in luck since there is a CLI available called tethereal.
History of Ethereal

You May Also Find These Documents Helpful

  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Select an ARP frame labeled Who has ##.##.##.##? where ##.##.##.## is the default gateway address recorded on page 1. Make the Ethereal Application window full screen if it isn’t already full screen.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISS Week 3 Vlab 1

    • 136 Words
    • 1 Page

    To be able to see all the packets that come in and out on the Network…

    • 136 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    4. As the software recommender for the company I would have to recommend Nmap to the Senior Administrator. Features of Nmap is that it is useful for performing tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    netw 240 week 7

    • 330 Words
    • 3 Pages

    Select an ARP frame labeled “Who has ##.##.##.##? where ##.##.##.## is the default gateway address recorded on page 1. Make the Ethereal Application window Full Screen if it isn’t already full screen.…

    • 330 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    A Network Management system, or NMS is a collection of software to be used as tools to monitor a network of computers. This software performs multiples tasked specifically designed to help keep a network managed properly and running smoothly. There are many components that can make up a Network management system. With all the options out there a network administrator is able to customize what features to utilize depending on their specific needs. This allows for real-time monitoring as well as report generated analyses. However, there are a few cornerstone components that should be explored. The Manager, Agent, MIB, Probe, SNMP, and RMON are probably the most valued components.…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    100 NT2580 Lab01 Final

    • 287 Words
    • 2 Pages

    In this lab, you explored the common tools available in the virtual lab environment. You used…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    CAPTURE A FRAME USING WIRESHARK FROM YOUR HOME COMPUTING NETWORK. EXPAND THE PART THAT SHOWS THE ETHERNET FRAME. TAKE A SCREEN DUMP (SHIFT PRINT SCREEN / PAINT) AND PASTE IT HERE.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Networking Project Week 4

    • 1212 Words
    • 5 Pages

    One might think that a hospitals soul operations is to provide doctors and nurses to assist patients with their sickness and diseases. However, there is a ton of operations and systems that go on in the background. At Patton-Fuller Community Hospital, they split up their business information systems in four ways. Patton-Fuller Community Hospital use this system to improve communication and collaboration between senior management, employees, doctors, nurses and patients. In addition, the current system is suppose to improve the efficiency of hospital operations, relationships with current and future patients, and assist senior executives in managing hospital finances.…

    • 1212 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    unit 7 security threats

    • 449 Words
    • 2 Pages

    The purpose of networking tools: Networking tools are the tools used in a network to manage the network and to make it simpler and easier for you to troubleshoot problems and fixing a network by providing effective support through software’s like HP openview, Cisco works and wireshark.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 251 Words
    • 2 Pages

    PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

    • 251 Words
    • 2 Pages
    Satisfactory Essays

Related Topics