To network engineer, in usual job, most working ability of the foundation should make sure the network is smooth namely do not give a mistake. But actually, the network malfunctions possibly at any time, the influence works normally, the mark that the ability that brings about network engineer to always want to carry; of very much black boiler on the back to solve network breakdown to had become a net to be versed in quickly so thereby examines matched.
How can that just solve network problem quickly? Generally speaking unit or the enterprise can install network breakdown to run software, will manage and remove the trouble of the network through software. You are versed in as our net, must know problem of what network breakdown, check a these problems quickly thereby. Reason is little make up sum up common network breakdown problem and command to everybody today.
One, network breakdown classifies summary
So, what is the reason that the network malfunctions? The basis concerns the statistic of the data, the network malfunctions specific distributing for:
Applied layer occupies 3%; to state the layer occupies 7%; conversational layer to occupy 8%; to transmit a layer to occupy 10%; network layer to occupy layer of 12%; data link to occupy 25%; physics layer 35% .The cause that causes network trouble still has the following kinds:
(1) logistic breakdown
The commonnest circumstance in logistic breakdown has two kinds: One kind is configuration mistake, it is the configure a mistake and causes network because of network equipment unusual or breakdown. Configuring wrong likelihood is a road by implement port parameter set has a mistake, or road by implement road by configuration mistake, so that the road cannot find far end by the loop address, or the road installs a mistake to wait by code of attack by surprise. Another kind is a few significant progresses or port are shut, the load that basically is a system is exorbitant, road by implement laden and exorbitant.
(2) configures breakdown
Configuring a mistake also is one of main reasons that bring about breakdown happening. Main watch cannot realize configuration breakdown now all sorts of services that network place provides, if cannot receive Internet, cannot visit server of some kind of representative to wait. Normally expression is configuration breakdown the following kinds of circumstances:
Network link test is normal, and cannot receive network; to be able to correspond with certain computer only repeatedly, and the server in cannot undertaking with whole computer; computer can visit in-house network only corresponding, but cannot receive Internet, this may be a road by implement configuration is wrong, also may be switching equipment configures wrong; computer to cannot login to cannot visit any other facility to computer of region controller; .(3) network breakdown
The reason of network breakdown is many sided, general component is physical breakdown and logistic breakdown. Physical breakdown, call hardware breakdown again, line of bridge of card of parts of an apparatus of cable of bag vinculum road, wire, join, port, net, net, collect implement, switching equipment or road by implement module appears breakdown.
(4) agreement breakdown
The communication between the computer and network equipment relies on an agreement to come true, the agreement is acting very important role in the network. Normally expression is consultative breakdown the following kinds of circumstances:
The computer cannot login to cannot see his already in the neighbour on the net to server computer, also cannot see other computer or do not search computer of other computer; to be able to see oneself and other computer in the neighbour on the net, but the title that cannot scan computer of the Web, other in sending and receive Email; computer to cannot receive Internet; and network through the local area network in sth resembling a net of local area network repeats, the IP address that perhaps uses with other computer is identical.(5) DDOS attack
(Accident of 6) network manager
Network manager accident occupies the 5% above of whole network breakdown, basically happen in network layer to mix transmission layer, because installation did not abide by operation guideline completely,be, or network manager did not give enough attention to cause to a certain process.
(Problem of 7) magnanimity memory
The mainest reason of data processing breakdown is hard disk problem. According to concerning a report, the systematic be no longer in force that has more than 26% about on the medium breakdown that end stores to magnanimity.
(Breakdown of 8) computer hardware
The trouble that has 25% about is caused by computer hardware, like driver of monitor, clavier, mouse, CPU, RAM, hard disk, net card, switching equipment is mixed road by implement etc.
(9) software issue
The trouble that software causes is not rarely seen also, expression is:
Software has drawback, cause defect of operating system of network of systematic breakdown; , create systematic be no longer in force.(The accident that the person that 10) is used produces
The person that use did not abide by the attributive that the network gifts. For example:
The data data; that system of visit exceeding authority and service; invade other system; to handle other user shares Zhang date; to duplicate illegally. Have network breakdown generation already, have network government so.Network breakdown management includes 4 commonly:
Undertake monitoring to the network, foretell ahead of schedule after breakdown; malfunctions, the positional; that finds breakdown happening solves breakdown; to record the account that breakdown produces, find settlement methodological;2, commonly used network breakdown checks an order
Commonly used network breakdown checks a command to Ipconfig, Ping, Tracert, Netstat and Nslookup wait. Below the main use that shows them simply.
1.Ipconfig command
Use Ipconfig command can examine IP configuration, or cooperate to use / All parameter examines a network to configure a circumstance. The specific configuration information that Ipconfig commands to the form that uses Windows window will show IP agreement. If do not move directly with any parameter at the back of Ipconfig command, the physical address that the program will show network adapter in the window, IP address of lead plane, child code of net attack by surprise and acquiescent gateway. Return the pertinent information that can examine lead plane through this program, wait like type of server of leader name, DNS, node. Among them the physical address of network adapter is detecting when network mistake very useful. Is Ipconfig/ inputted below command clew accord with? Can obtain the use help of Ipconfig, input Ipconfig/all can acquire all property that IP configures
Command parameter introduction:
"" : Do not take any parameter option, show IP address for every interface that had configured, child code of net attack by surprise and acquiescent gateway value. ? : Undertake parameter inquires;all: Show the detailed information;release that this machine TCP/IP configures: PHCP client end releases IP address;renew by hand: DHCP client end requests;flushdns to server refresh by hand: ;registerdns of content of cache of DNS of cleared this locality: DNS client end undertakes registered;showclassid to the server by hand: The;setclassid of DHCP category information of indication network adapter: Install the DHCP category of network adapter.Click " program "- - " move " , input Cmd enters Dos to command a window. Command to Ipconfig/all is inputted in travel window in Dos, following place are shown
This machine TCP/IP was shown to configure a circumstance in the graph. If show IP address is absent the net of the network paragraph in, this machine cannot correspond with other machine; if configuration of gateway, DNS has by accident, criterion this machine cannot visit outer net computer, also cannot get online.
Use / Release and / Renew parameter gets IP address from DHCP server afresh.
2.Ping command
Ping command basically is to use examination means by whether can arrive at some site. As a result of this jussive the bag grows small, the rate that delivers on the net so is very rapid, can detect quickly whether can be the site that should go amounted to. If carry out Ping not to succeed, can forecast breakdown to appear in the following respects:
Whether does reticle put through; network adapter configures address of whether correct;IP to whether can be used etc.If carry out,the network still cannot be used, the problem may give the software configuration side in network system. Ping can assure successfully to a connecting physical method exists between current leader and purpose lead plane only.
Command to Ping / is inputted in the window in Dos? , each parameter that can see Ping are as follows:
(1)ping commands parameter introduction
/ T: Ping appoints the lead plane that the user is in to transmit data to target lead plane, until interrupt. / A: Will show the network address of target lead plane with IP address format, the address analytic for computer name.It is Lenovo through running Ping -a 192.168.0.109 to be able to know IP is the computer name of 192.168.0.109
- N Count: The Echo data that transmits Count to appoint includes a measure. Acquiescent value is 4- the Echo data package that L Size; sends a bag to contain Size to appoint data bulk. Acquiesce is 32 byte, maximum is 65527 byte. - F; is sent in data bag " do not want section " mark, data is wrapped won't by the road by the gateway section that go up - I TTL; will " live time " the value that field setting is TTL to appoint - V TOS; will " type of service " the field sets the value that assigns for TOS - R Count; is in " record a road by " the record in the field comes out and return data. Count can be appointed least 1, it is 9 computers at most. - the jumps check the number time jab that S Count; appoints Count - the computer list means that J Host-list; uses Host-list to appoint is wrapped by data. Successive computer can be broken up by intermediate gateway (road by few and far between) , the largest amount that IP allows is 9. - the computer list means that K Host-list; uses Host-list to appoint is wrapped by data. Successive computer can be not broken up by the gateway intermediate (road by strict source) , the largest amount that IP allows appoints overtime interval for 9-w Timeout; , the unit is millisecond.(2) uses Ping to command test breakdown measure
A computer cannot visit the Web resource on Internet now, can use Ping to command the position that finds out breakdown. Operation move is as follows:
A.ping 159.0.0.1 if Ping is illogical, this explains this machine TCP/IP was not installed good. The IP address of this B.ping machine if Ping is illogical, this explains the net gets stuck to was not installed good, or net card drive has a problem.(This 3) Ping net paragraph address of other equipment IP
If PING is illogical, show connection the circuitry of this machine has a problem, or the port of switching equipment has a problem, likely also switching equipment itself appeared problem.
(This 4) Ping net paragraph gateway
If Ping is illogical, cannot get online, because do not have,equipment can issue data package. The reason may be a road by implement good without configuration or acting service gave an issue.
(Server of 5) Ping DNS
If Ping is illogical, explain DNS server gave an issue, or the DNS server setting of this machine is incorrect.
3.Tracert command
Tracert command is used examine data bag is to pass above method reachs destination. Through executing Tracert order, can see the route that data takes clearly, sentence destiny to obtain the ways and means that place of purpose lead plane passes according to the bag, indication data includes the trace node detailed list of the course and arrival time. When Ping a further lead plane appears when the mistake, it is OK to command with Tracert conveniently fish data bag makes mistake where. If information includes a route by implement also cannot pass through, the gateway that is the computer likely installs a fault. So, can be examined with Ipconfig command.
Tracert commands format grammar format:
Tracert [- D] [- H Maximum_hops] [- J Host_list] [- W Timeout]
Among them main parameter has:
- D; is not analytic the name of target lead plane - H Maximum_hops; appoints a search to be counted to the greatest leap of target address - J Host_list; according to the address source of release in lead plane list the road appoints overtime time-interval by;-w Timeout; , the quantum of time with acquiescent program is millisecond.4.Winipcfg command
Winipcfg jussive function and Ipconfig are basic and identical, just go up in the operation in Winipcfg more convenient, can show with the graphical interface means of Windows at the same time. When the configuration case that examines the TCP/IP agreement on an any computers when need, choice " begin "- - " move " , winipcfg is inputted in occurrence dialog box, can appear test result.
Winipcfg [/ ? ] [/ All]
Among them main parameter has:
/ the configuration information that All shows all concerned IP addresses / Batch [File] write the order as a result appoint a file / Renew_all tries all network adapter again / Release_all releases all network adapter / N/release N of adapter of network of Renew N restoration releases network adapter N5.Netstat command
Use this command to be able to show concerned statistic information and case of connection of current TCP/IP network, user or network administrator can get very detailed statistic result. When the special without installation gateway software in the network, but when wanting to understand the whole use situation of the network in detail, netstat command is very useful.
Format of Netstat jussive grammar:
Netstat [- E] [- S] [- N] [- A]
Among them main parameter has:
- A; shows all establish connective port information with this lead plane - N; shows address and port information with digital format. - the statistical information of net of E; indication aether, this parameter is used jointly with S parameter commonly. In shows content, discards expresses mishandle and deserted information includes number, errors states broken information includes number. When these numerical value are great, probable it is collect line implement, the hardware such as cable and net card produced breakdown. Additional, the network is too crowded the accretion that causes these numerical value possibly also. - the statistical case that S; shows every agreement. If want statistic the detailed information in current local area network, can be examined through inputting Netstat -e -s.6.Nslookup command
Nslookup command is to use those who confirm DNS server action commonly. Nslookup has many to choose a function, input all right in the command " Nslookup< leader name > " carry out, can show the leader name of target server and corresponding IP address, become to analytic. If failed, the DNS that may be computer of executive Nslookup jussive installs a fault, the DNS server that also is an inquiry likely stops or the job is unusual. Still have a kind of case, although was returned respondent, but be in and fail. Person majority is target server quits the job, but the information that server of possible also DNS saved a mistake. When DNS server occurrence problem, can undertake possibly only sometimes to analytic, cannot converse and analytic. Right now, need to execute Nslookup order only, look to whether output target leader name can.
Nslookup commands syntactic format:
Nslookup [- Subcommand. . . ] [{computertofind | [- Server]} ]
Use method:
Command to Nslookup is inputted below travel in DOS, press Enter, right now identifier turns into " > " , input the domain name that designates a website next, can show the answers relatively IP address of this domain name by Enter key again.
7.Arp command
Arp command can show and setting Internet expresses content to the address changeover of aether net. This watch is safeguarded commonly by Arp. When using master of a lead plane to be parameter only, arp commands the current Arp that shows this main engine expresses entry content. If this lead plane no longer in current Arp watch, so Arp can show one shows information.
Arp commands syntactic format:
Arp [- A] [- D Host] [- S Host Address] [- F File]
Among them main parameter has:
- A lists current Arp expresses all medium entry - the corresponding entry that D Host deletes a certain lead plane from inside Arp watch - address of net of use aether of S Host Address is in Arp watch for what appoint [Temp] [Pub] [Trial] lead plane founds an entry. If contain key word [Temp] , the entry that found is temporarily; otherwise this entry is permanent. [Pub] key word marks this Arp will be announced. Use [Trial] key word states use newspaper end is enclosed. - the document that F File reads to give a name, according to the file medium leader name founds the entry that Arp expresses.The world data is domestic can be counted on one's fingers own much part abroad the new-style IDC that constructs a computer room oneself serves trader, by industry accepted for " brand of first selection of Chinese IDC industry " .
The world data and whole world are close straight joint of top class computer room makes 120 many states, the rent that offers the server that includes country and the area such as Hong Kong, United States, Korea, Japan, Taiwan, Singapore, Holand, France, England, Germany, Egypt, south Africa, Brazil, India, Vietnam, cloud server serves, of need connect customer service of the world data please!
Outside removing the IDC product that offers a tradition, the main responsibility of the world data is to be large and medium-sized what the enterprise provides demand of more careful, safe, contented individual character is custom-built change server solution, be in especially sell continuously, finance, video, spread a lot of trade such as net of couplet of catenary of business affairs of media, game, electron, area piece, quick pass the time in a leisurely way, content, big data, all sorts of problems that in solving server hire for broad client, encounter.