Disclaimer: This is an example of a student written essay.
Click here for sample essays written by our professional writers.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UKEssays.com.

Network User Problems

Paper Type: Free Essay Subject: Information Technology
Wordcount: 3298 words Published: 20th Sep 2017

Reference this

Tiago Garcia Mourão (13265)

a)

Credential, Permission and Rights Problems

The user can have this kind of problem when tries to access/alter a host, folder or document and is not able to because they cannot log in, or they do not have that permission.

Network Performance

If the user or LAN administrator wants to use a wireless connection, it will drastically impact the network communication. This happens because today home-based wireless systems will not produce more than about 54-100 Mbps of transfer. And using a hub instead of a network switch can cause major issues with speed and latency, which means low performance network.

TCP/IP Conflicts

There are many reasons why this can be an issue, but the most common happens when at least two devices are trying to use the same IP address in the same network.

b)

By the morning, an user that works in a company, tries to logon into the Windows operational system using the network credentials given by the Network Administrator. But he gets the following error: “The relationship between this device and the domain failed”. The user tries to restart the computer and logon again, but gets the same error.

c)

Network Performance

If you are using a corporate network, make sure that you are not streaming or downloading music, video or whatever else while working. By doing that, you will be impacting the network performance and like it will make IP phone calls and file sharing, per example, really slow. The Network Administrator has to find a way to lock down this kind of problems, like blocking music/video streaming and files downloads.

TCP/IP Conflicts

When the Network Administrator faces problems like IP conflicts into the network, the easiest way to fix it would be releasing and renewing the device IP and try to use it again.

d)

Knowledge base – form

Name of the company

TGM Inc

Client’s Name

Ilson Neves

Date and time

01/12/2015 2:50 PM

Problem Detail:

Users are complaining about devices IP conflicts every day during the usual work.

Signature Tiago Garcia Mourão

Date

01

12

2015

Name of the technician

Tiago Garcia Mourão

Date and Time

02/12/2015 9:30 AM

Service Hours

2 hours

Proposed Solution

Release and renew the IP address in every device and then, check the router in order to adjust the number of available IP’s.

Signature Tiago Garcia Mourão

Date

02

12

2015

Resource

N/A

Costs

NZD 200,00

Procedure Personnel

I accessed the CMD in every computer and enter the commands “ipconfig /release” and “ipconfig /renew”. Then, I checked that the internet connection was working properly in every single device. Then, I checked that the amount of devices accessing the network was smaller than the amount of IP’s available.

Signature Tiago Garcia Mourão

Date

03

12

2016

Company contact

Address

50, Queen St

Information

Phone

05 0976394

Website

www.tgm.co.nz

1.2 – Fileserver problems:

a)

File Sharing

One of the most common problems related to fileservers is file sharing. When users try to access the folder/document in the server, they can get errors like “Not authorized access” or “The file is being used”.

Data Backup

An important action related to fileservers is the backup. The most of companies have files that need to be accessed many times per day and by different users, no matter what.

b)

A company user created a shared folder on the network to allow other department users read and edit documents. After adding these documents, other users tried to open the documents, but they got the following error: “Windows cannot access the document. You do not have the permission to access the document. Contact your Network Administrator to request access.” The users restarted the PC’s and tried to access the documents again, but still got the same error.

c)

File Sharing

If the users cannot access shared folders or alter shared folders, the Network Administrator has to check the reason. The first step is checking if the folder/file owner has shared it. Otherwise, only him will be able to access it. If it have been done, the next step is checking if the file is being used by another user. After that, the folders/files have to be available for the allowed users in the network.

Data Backup

If the server crashes or the file is deleted by mistake, the Network Administrator has to get the last backup version as soon as possible, no matter what.

d)

Knowledge base – form

Name of the company

MG Enterprise

Client’s Name

Carlos Silva

Date and time

01/09/2016 4:30 PM

Problem Detail:

Users are complaining that they cannot access or alter any folders or files into the fileserver.

Signature Tiago Garcia Mourão

Date

01

09

2016

Name of the technician

Tiago Garcia Mourão

Date and Time

02/09/2016 7:30 AM

Service Hours

3 hours

Proposed Solution

Check the fileserver configuration, the folders/files sharing status and the list of allowed users.

Signature Tiago Garcia Mourão

Date

02

09

2016

Resource

N/A

Costs

NZD 300,00

Procedure Personnel

First, I tried to access the folder and files into the fileserver using the users’ PC. I got the same permission error in every single PC. Then, I went to the data center and checked that the fileserver IP was configured properly. Then, I checked that the folders and files sharing option were OK. And the last step was include all the desired users to the sharing list. After that, I tested all the PC’s and all of them were able to access the folders and files.

Signature Tiago Garcia Mourão

Date

03

09

2016

Company contact

Address

5, Welesley St

Information

Phone

07 9845672

Website

www.mgenterprise.co.nz

1.3 – Performance issues:

a)

Wireless

Apart of wired connection, the wireless connection can subject your connection to variable conditions. Because of that, the data delays can bring the transfer performance down.

Memory (RAM)

The data transfer over the network does not need much system memory usage, but can affect the performance of other OS components. If the system memory is too low, the system has to access the HD more often, and the writing/reading disk performance will be low as well.

b)

Every week a company leaders need to make a videoconference with another branch for a brainstorm. Both branches use Skype for it, but they are having some problems related to the network. The connection is very slow and the call crashes, even if the computer is connected to the internet using the wire.

c)

Memory (RAM)

In order to increase the network data transfer, the user can add more RAM memory to the laptop/PC, making the writing/reading disk faster and avoiding the HD access.

Wireless

If the user wants to increase the wireless connection performance, the best ways would be getting closer to the Access Point to get a high quality connection or buying a better Access Point, if possible to support more users at the same time.

d)

Knowledge base – form

Name of the company

GT Ltd

Client’s Name

Bruno Souza

Date and time

01/02/2017 8:50 AM

Problem Detail:

The users are complaining that the wireless connection is too slow and sometimes crashes.

Signature Tiago Garcia Mourão

Date

01

02

2017

Name of the technician

Tiago Garcia Mourão

Date and Time

02/02/2017 4:30 PM

Service Hours

5 hours

Proposed Solution

Check the distance between the Access Point and users; and if it supports the amount of users at the same time.

Signature Tiago Garcia Mourão

Date

02

02

2017

Resource

N/A

Costs

NZD 500,00

Procedure Personnel

Using different users laptop’s, I could see that some users had wireless signal was too poor. To those users who got good signal, I checked the internet access speed. It was extremely slow and crashing several times. Checking the amount of users and AP’s, I told the IT manager that the problem was that the company needs more AP’s to spread the signal and to support the amount of users. After installing and configuring some new AP’s, all the users have fast wireless connection.

Signature Tiago Garcia Mourão

Date

03

02

2017

Company contact

Address

10, Quay St

Information

Phone

09 9756729

Website

www.gt.co.nz

2.1 – Identify and list any 5 network monitoring tools:

Nagios

One of the best known free tool. The most important part of the tool is the core and it allows you to build plugins to monitor particular elements. It has a large-scale use.

Zenoss

This software was created to monitor server, storage, applications, networks and virtual servers.

Monitis

Focused on small or medium-sized companies, this application can arise as a great network tool.

Pandora FMS

It’s capable of monitoring over 10,000 nodes and monitors servers, networks and applications. It has many alerts, reports and third party integrations, etc. Its network autodiscovery system can find all the network elements in a short time.

Zabbix

It’s known for being easy to configure and for having a very powerful GUI. It has agentless monitoring service can monitor up to 10,000 nodes without performance issues.

2.2 – Install network monitoring tools:

According to the figure below, during an average websites usage at 3PM, the total traffic size was 4.24MB, the transfer rate was 136.942Kbps and the packets amount was 9,384 (474.000 bytes):

(Figure 01: Capsa Free software – Summary tab)

(Figure 02: Capsa Free software – Dashboard tab)

After few minutes, a new Youtube tab was opened at 3:03 PM and then the total traffic size was 35.15MB, the transfer rate was 531.204Kbps and the packets amount was 50,292 (732.000bytes), according to the figure below:

(Figure 03: Capsa Free software – Summary tab)

(Figure 04: Capsa Free software – Dashboard tab)

2.3 – Analyse the bandwidth information:

According to the figures above, the usage of network didn’t reach its limits. The maximum usage that it reached during the tests was 0.053% of the bandwidth.

2.4 – Explain different techniques for LAN performance:

Watch everything

Users often complain about the network performance, but the most of times, the network has nothing to do with it. One of the best techniques to improve the LAN performance is monitor everything, from network latency and throughput, to CPU and RAM utilization. Monitoring the switches and routers, the network error rates and configuring some logfiles alerts will make the network faster.

Know your apps

The network is always being consumed by the applications. Even being hard to see exactly what is going on, is possible observing their effects on the infrastructure. The best way to keep your network performance is testing the software in a testing environment before purchasing/installing it in the infrastructure and check the amount of resources is being used.

3.1 – Identify and explain security exposures and violations:

Former Employees

Attacks coming from inside the network are one of the biggest threats to a corporate network. Former employees, especially from IT department, that have the networks, admin accounts and data centers access can spread/sell this information or even hack the company.

Careless Employees

An employee that forgets files or the cellphone/laptop inside a taxi cab or on a restaurant table could allow a malicious person to use this information or sell it to competitor companies.

3.2 – Determine the possible solutions for the CVE:

Former Employees

In order to avoid this kind of danger, when an employee is about to be dismissed, the Information Security Analyst or the Network Administrator has to fill out a form describing all the access rights to be revoked(systems, servers, data centers, etc) and ask to an analyst do it.

Careless Employees

Information stealing is one of the most dangerous ways to get corporate information leaked. To avoid it, employees must look after classified documents, cellphones, laptops, etc and keep it safe. Electronic devices must have passwords, per example.

4.1 – The sender in a LAN sends 10110110; a hacker alters the data and the receiver receives 10100110. As a network expert analysis to find out the position of error bit:

4.2 – Analysis a 10 bit sequence 1010011110 and a divisor of 1011:

Viper Plagiarism Scanner Report

Data Expedition, I. (s.d.). Data Expedition, Inc. Fonte: Data Expedition Inc: http://www.dataexpedition.com/support/notes/tn0009.html

Kosse, T. (s.d.). Tim Kosse. Fonte: https://ftptest.net/: https://ftptest.net/Help

Prigge, M. (1 de June de 2010). IDG Communications, Inc. Fonte: InfoWorld: http://www.infoworld.com/article/2627174/network-monitoring/10-tips-for-boosting-network-performance.html

Schiff, J. L. (20 de January de 2015). IDG Communications, Inc. Fonte: CIO: http://www.cio.com/article/2872517/data-breach/6-biggest-business-security-risks-and-how-you-can-fight-back.html

Shimonski, R. J. (3 de November de 2009). TechGenix Ltd. Fonte: WindowsNetworking.com: http://www.windowsnetworking.com/articles-tutorials/common/Top-5-Networking-Issues-Windows-Clients.html

Steve. (2 de January de 2017). Pandora FMS Team. Fonte: Pandora FMS: https://blog.pandorafms.org/network-monitoring-tools/#comparison

 

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: