background image
Summary
19
Network and routing protocols
Traffic levels and network events
Applications
Changes made to network configurations
Historical information that documents previous troubleshooting
sessions
In addition to having all of this data available to you, it is helpful to have
a checklist that you can refer to when you troubleshoot. A list may be created
from baseline information if desired. Each individual knows their network
and the types of changes that are made on it; each network's checklist would
look different. For me to create a model checklist here and say that this is
the checklist that everyone should use when resolving network problems
would be pointless.
Summary
I
n this chapter, you learned about the complexity of today's networks
and the importance of adhering to a troubleshooting model to aid in effi-
ciently and effectively isolating and resolving network problems.
Different methods of problem isolation were discussed as well as the trou-
bleshooting method itself. Along with the discussion were examples of what
should be done in each step.
Here are some highlights of this chapter:
Troubleshooting skills are gained through experience. It is unreason-
able to expect that you can jump in on your first network failure and
be able to solve it quickly. Experience is the best teacher.
Following a problem-solving model helps you to reach a timely solu-
tion to network failures. Knowing your network helps, but the
"shooting-from-the-hip" style of troubleshooting is nowhere near as
effective as a methodical and logical process.
Three methods of problem isolation were discussed in this chapter, but
it is up to each individual to use a method they are comfortable with.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com