Network Inspection Procedures
Network Inspection Procedures
Network Inspection Procedures
A. READINGS/DISCUSSIONS
Background Information for Learners
The following are the procedures on how to maintain computer system and
networks:
1
COMPUTER and NETWORK MAINTENANCE CHECKLIST
Performing routine checks like checking your smoke alarms in your home
and making sure your car has been serviced at regular intervals are extremely
important. Equally as important is the routine server and network maintenance
and checks on your information technology systems. Most organizations already
have monitoring in place but periodic maintenance must also take place. So
what’s the difference between monitoring and performing maintenance? Even if
you are constantly monitoring your equipment you might ask yourself, why
should you also do maintenance?.
Monitoring is something you usually do in real time and you will always
continue to do. Maintenance is something that would typically have a checklist
attached to a process and will be done on regular intervals. A maintenance
checklist is something that should always be done to ensure that everything is
checked off and not missed.
Step 1: Anti-virus
Update your anti-virus software and run a scan. How you do
a scan will depend on what program you’re using but most
have very clear instructions right from the start. Unless
you know there’s a problem I recommend doing the
programs’ default scan. You only need a full scan if you
know you’ve got a virus and the default hasn’t found it. I
also recommend plugging in any external hard drives so
they get checked at the same time.
Step 2: Anti-spyware/anti-malware
Most anti-virus programs do a basic spyware check too, but do both to make
sure. There are many options for spyware removal software, Malware Bytes Pro,
Super Antispyware and Spybot: Search and Destroy are recommended. Many
also offer to protect your browser(s) against future incursions which I’d
recommend as it can save you a lot of time and trouble.
Like anti-virus programs how they work will vary but it’s usually easy to see what
you need to do, often you just click a button and let it go.
it’s still on your hard drive and still taking up memory. Disc
Cleanup (See Step 4) will empty the recycle bin
automatically, but I like to do it manually just in case
anything important ended up in there by accident.
There should be a recycle bin icon on your desktop, but if
not it’s on the start menu. Just open the folder, check
what’s in there and click ’empty recycle bin’.
2
(your main hard drive(s), any that are just used for data storage won’t have
problems) and let it go.
It finds files that aren’t needed any more and odd bits of data that got left behind.
Stuff like web pages that were archived automatically, temporary files that never
got deleted, old service pack backups and so on. It then presents you with a list
of what it’s found and how much memory each item is taking up. You can pick
and choose which ones to delete but I like to do the whole lot.
Expert level technicians may want to clean up the system registry (do not
attempt this unless you are absolutely sure you know what you are looking for)
Step 5: Defragment
Again this program comes with Windows, it’s in the same place as the Disk
Cleanup tool. It’s a straightforward process; pick a drive, ask for analysis and if it
says it needs defragmenting let it do its thing.
Ask yourself if these really need to be running in the background each and every
time you switch the computer on and uncheck any that don’t make the cut. Then
click apply, then OK. Next time you start up your computer those programs won’t
start with it. You can still open them manually and they’ll work exactly the same
way, but they won’t be hogging resources when you’re not using them.
Step 8: Check file backup plan and create system recovery disks if applicable
Make sure to have a file backup plan and create system recovery disks if available.
System images are always a good idea as well.
3
Step 9: Clean and dust internal computer parts and fan (check fans and
computer temp.)
Hardware and software installation, replacement and upgrades are very common
network maintenance tasks. In a Cisco internetwork, this may include replacing
older or failed hardware, such as switch line cards and supervisor modules in
Catalyst 4500 and 6500 series switches, for example, as well as upgrading the
Cisco IOS images to current revision or patch levels for routers and switches
alike.
1. Verify the performance of the network and all internetwork devices in the
network
4
While most network engineers consider documentation a rather mundane and
even lowly task, it is important to understand that documentation is a critical
component of network maintenance as well as troubleshooting and support. It is
important to understand that different organizations have different standards for
acceptable levels of documentation. There are several guidelines or
recommendations that you should follow when documenting the network:
The first guideline is ensuring that you understand your scope of responsibility.
That is, it is important to understand what it is that you are responsible for. For
example, you may be working in an organization that has a voice, security,
storage and network team all under the Information Technology (IT) department
umbrella. Rather than attempting to create documentation for all the teams, you
should make sure you should only document those networks and devices that
are within your administrative responsibility.
No matter how great the documentation that is created is, it helps no one if the
documentation cannot be accessed by those that may need it to support
troubleshooting or support functions. Where possible, documentation should be
stored in a location that is readily and easily accessible to all those that may use
it, such as on a secure network location or share. In some cases, depending on
the organization, it may be necessary for documentation to be stored in a
secured, offsite location for disaster recovery and business continuity purposes.
And finally, once the documentation has been created, it is important to ensure
that it is always maintained and up-to-date. Network diagrams from years ago
may contain misleading and incorrect information that may hamper
troubleshooting information. Network documentation should be considered living
documentation that changes at the same rate as the network. Following the
completion of each network project, existing documentation should be updated to
5
reflect the changes that were made to the network.
Although there are no standards that determine what information should and
should not be included in network documentation, most organizations and
businesses have their own standards for what should be included in the network
documentation. It is important to adhere to these standards and guidelines when
creating documentation. From a best practice’s perspective, network
documentation should include the following information at a minimum:
1. Information about the interconnects between devices for LAN and WAN
connections
7. Configuration information
8. Any original or additional design documentation and notes
9. Data or traffic flow patterns
Using network monitoring, you can identify potential issues before they arise as
well as plan for possible network upgrades or expansions, i.e. capacity
planning, based on the identified potential issues. Effective planning can be
used to define the maintenance tasks required on the network and then
prioritize those tasks and the order in which they will be implemented.
Backups are a routine maintenance task that is usually given a very low
priority. However, it is important to understand the important of backups –
especially when attempting to recover from a serious or critical failure of the
network. Backups should therefore be considered a core common network
maintenance task, and should be allocated a high priority. It is important to
ensure that backups of core network components and devices are scheduled,
monitored and verified at all times. Having up-
to-date backups of core devices can assist in the faster recovery of the network
6
or individual network components following hardware or software failures, or
even data (configuration) loss.
You’ve set up all your network switches, plugged in all the cables, and
configured all your computers. One task remains before you can declare your
network finished: You must verify that the network works as expected.
Here are a few simple tests you can conduct to make sure your network is
functional.
7
2. Verify that you can log on.
When you’re sure the physical connections are good, you should attempt
to log on to each of your network computers using a valid domain user
account.
Click the Start button, type cmd and press Enter. Then, enter the command
ipconfig /all and press Enter.
4. This command will spit out numerous lines of information. The line
you’re looking for should resemble this:
IPv4 Address. . . . . . . . . . . : 192.168.1.125(Preferred)
If this part of the output does not show a valid IP address, you need to
check that your IP configuration is set correctly and that your DHCP
server is working.
Notes: Do several ping tests. First, make sure that TCP/IP is up and running by
having the computer try to ping itself. Open a command prompt and type ping
localhost. The output from this command will indicate whether or not the ping was
successful.
Next, try to ping your servers by name. For example, if your file server is
named FileServer01, use the command ping FileServer01.
Unplugged or loose network cables are one of the most common reasons
why you might suddenly find yourself unable to connect to the Internet.
That's a problem on wireless networks, but on most laptops the
wireless-fidelity (Wi-Fi) radio can be inadvertently shut off instead. On
home networks, it's also possible that someone unplugged the router.
Action: Before assuming your Internet connection is faulty, try visiting several
popular Web sites rather than just one.
3. IP Address Conflicts
If your computer and another on the network both have the same IP
address, the conflict between them will prevent either from working
properly online. Figure 140. Error Messages 200
Action: Use one of the options written below to measure the strength of your
wireless signal and try these ideas to expand the range of your Wi-Fi. Ideally,
you should place the router at a height in some central location and away from
other cordless devices. Make sure that the router is not placed near something
metallic (like an almirah or window grills) as that will weaken the wireless
signals. Avoid mirrors as they can reflect the wireless signals away from the
desired direction. Wireless routers generally ship with omni-directional antennas
but you can replace them with more powerful uni-directional antennas and that
will keep the signal from getting broadcast in all directions.
Action: Confirm that the Wi-Fi channel number and encryption keys on your
router have not recently changed (check with the network administrator if
necessary). When using a hotspot, follow the provider's instructors for signing in
carefully.
Action: Check the router's lights and console if possible, to ensure it is running
and responding properly. Troubleshoot and reset the router if necessary. Change
the old router if necessary.
Action: Contact your ISP if you suspect your account has been
blocked. 9. Computer Glitches
Action: Check the computer and remove any malware that you will find. On
Windows computers, try resetting the network connection. Reboot the computer if
necessary. 10. Network Downtime
Those using satellite Internet service may notice they cannot connect to
the Internet during periods of very bad weather. Providers in dense
urban areas (including cellular Internet carriers) sometimes are unable
to support 203 peaks in network traffic that causes sporadic outages for
some customers. Finally, those who subscribe to newer or more complex
10
forms of Internet services (such as fixed wireless broadband) may
experience more downtime than others as providers encounter more
issues with relatively less mature equipment.
Action - If all else fails, contact your Internet provider to verify whether they are
experiencing an outage. Some providers also give advice on troubleshooting
problems connecting to their network.
B. Exercise
Write an essay about the importance of network inspection procedure. Relate your
statements to the most treasured skills you acquired in the lesson. Give also your
own title for the essay (minimum of 400 words).
Rubrics
C. ASSESSMENT
11
discover vulnerabilities or potential security threats.
8. Regulatory policies, which are mandatory enforcements of compliance
with industry regulations and laws, will doesn’t differ at all for businesses.
9. Backups are a routine maintenance task that is usually given a very high
priority.
10. Documentation is one key critical component on computer inspection
and maintenance, it is but important to ensure that is always maintained and
keep up-to-date.
References:
Harlet Grace Basiao-Pondo
TLE/TVL CSS Grade 12, Activity Sheet No. 6, First Edition, 2020
COMPUTER SYSTEM SERVICING NC II ACTIVITY SHEET
Network Inspection
Accompanying DepEd Textbook and Educational Sites (With Possible Materials for experiments/activities)
Piano, Jean B. (2017). CBLM on Computer Systems Servicing NC II. Nalsian-Tomling Malasiqui Pangasinan.
K to 12 Technology and Livelihood Education Grade 10 e-chs-lm-module 4 Lujero, Rosalie P. et Al, 2014, CHS Learners Material.
Prepared by:
EDA FLOR M. ARRABIS
Subject Teacher
12