Configuration, Operation, and Troubleshooting of Enterprise Routers
VerifiedAdded on 2022/11/14
|15
|3274
|402
Practical Assignment
AI Summary
This assignment focuses on the practical aspects of installing, operating, and troubleshooting medium enterprise routers within a Wide Area Network (WAN) environment. It covers the design and implementation of a WAN network, including hardware components like routers, switches, and PCs, along with cabling considerations. The assignment delves into IP addressing, subnetting, and initial router configuration, including firmware upgrades and basic security measures using SSH. Furthermore, it explores static and default routing, followed by dynamic routing protocols such as RIPv2 and EIGRP. The document details the configuration steps for each task, including IP address ranges, requirements, and device-specific configurations. Troubleshooting using the ping command and the implementation of network security are also discussed to ensure the proper functioning and security of the network.

TITLE: INSTALL, OPERATE AND TROUBLESHOOT MEDIUM ENTERPRISE
ROUTERS
Install, operate and troubleshoot medium enterprise routers
ROUTERS
Install, operate and troubleshoot medium enterprise routers
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Abstract
WAN hardware are the physical components in a network set up. These are device that are tangible
such as, laptop, PC, routers, switchers, cables among others. However, wireless network uses
invisible device to transfer information such as invisible radio frequencies or infrared waves. The
path can also be physical also such as cables or invisible wireless. All these components depends on
the customer preference and also the budget. Implementation process is the next one now. We have
to place the computers and servers in the convenient place in the room. When the set up is
complete, then we can now connect the cables through all components. We then have to switch on
the power then start configuring the router and switches. This will ensure the correct data flow and
also in case of any problem then it will be easy to solve by checking the affected switch directly.
Also conflicts will be eradicated between the layers of the switch. The all connection is complete
and the manager can instruct the employees to use the network now (BShara, Tracy, Callaghan, ...
& Crabbe, 2019).
Introduction
Firmware upgrade on the router is necessary for new features and also security purpose. All the
vulnerabilities that might have been detected will fixed by new features. Also since technology is
advancing then all the time the devices should be in latest version. Upgrading also might means
adding up the new security features that was not there hence improving the new features of the
devices. The general performance also might be improved hence it is most important in the
efficiency of the router (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device. We have to analyze network performance after the full installations.
Software such as protocol analyzer and network management software can be used since they are
reliable. Analysis of one month results will be more suitable and very convenient since it shows
roughly how network is being used by employees. The analyzers can show what time does
employees uses more network. During the working hours there is probably less use of network but
during free time they use more internet. The protocol analyzers are very powerful since they are
able to identify running protocols by default hence creating overhead and it can be switched off. IP
address design must be chosen and developed to fits growth requirements and also well designed
routing protocol which support quick convergence to facilitate proper management. Bandwidth
should be chosen based on the required performance. WAN transport should be design in a way that
it will be flexible in case bandwidth service changes is to be met in future (BShara, Tracy,
Callaghan, ... & Crabbe, 2019).
WAN hardware are the physical components in a network set up. These are device that are tangible
such as, laptop, PC, routers, switchers, cables among others. However, wireless network uses
invisible device to transfer information such as invisible radio frequencies or infrared waves. The
path can also be physical also such as cables or invisible wireless. All these components depends on
the customer preference and also the budget. Implementation process is the next one now. We have
to place the computers and servers in the convenient place in the room. When the set up is
complete, then we can now connect the cables through all components. We then have to switch on
the power then start configuring the router and switches. This will ensure the correct data flow and
also in case of any problem then it will be easy to solve by checking the affected switch directly.
Also conflicts will be eradicated between the layers of the switch. The all connection is complete
and the manager can instruct the employees to use the network now (BShara, Tracy, Callaghan, ...
& Crabbe, 2019).
Introduction
Firmware upgrade on the router is necessary for new features and also security purpose. All the
vulnerabilities that might have been detected will fixed by new features. Also since technology is
advancing then all the time the devices should be in latest version. Upgrading also might means
adding up the new security features that was not there hence improving the new features of the
devices. The general performance also might be improved hence it is most important in the
efficiency of the router (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device. We have to analyze network performance after the full installations.
Software such as protocol analyzer and network management software can be used since they are
reliable. Analysis of one month results will be more suitable and very convenient since it shows
roughly how network is being used by employees. The analyzers can show what time does
employees uses more network. During the working hours there is probably less use of network but
during free time they use more internet. The protocol analyzers are very powerful since they are
able to identify running protocols by default hence creating overhead and it can be switched off. IP
address design must be chosen and developed to fits growth requirements and also well designed
routing protocol which support quick convergence to facilitate proper management. Bandwidth
should be chosen based on the required performance. WAN transport should be design in a way that
it will be flexible in case bandwidth service changes is to be met in future (BShara, Tracy,
Callaghan, ... & Crabbe, 2019).

TASK 1
DESIGNING AND IMPLEMENTATION OF WAN NETWORK
WAN hardware are the physical components in a network set up. These are device that are tangible
such as, laptop, PC, routers, switchers, cables among others. However, wireless network uses
invisible device to transfer information such as invisible radio frequencies or infrared waves. The
path can also be physical also such as cables or invisible wireless. All these components depends on
the customer preference and also the budget (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
In our case, we need a Cisco router, two switches, two servers, cables and two PC's. The type of
connection here will be LAN network which is visible type of connection. As discussed with the
customer, the cost of the devices are affordable and it fits to their budget well therefore we have
made the order to the vendor. The next step is assembling the all components then installing
(BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Using the design have drawn, I have to fix the Cisco router first. The router will distribute WAN
network in this set up of LAN network. Since there are two PC's then each switch will be assigned
to it. We have to use enough cables from router to switches to minims the wastage and of course we
should strictly consider fire code. The strategic place for switches are also important. They should
be very close to PC hence that is realistic positions of it. After all the components are set in place,
we now use cables we have made to connect the network from router through switches to servers
and PC's. After all this is done, the network is now ready to work (Yondri, Irfan, Putri, Zaus, &
Islami, 2019).
We have to analyze network performance after the full installations. Software such as protocol
analyzer and network management software can be used since they are reliable. Analysis of one
month results will be more suitable and very convenient since it shows roughly how network is
being used by employees. The analyzers can show what time does employees uses more network.
During the working hours there is probably less use of network but during free time they use more
internet. The protocol analyzers are very powerful since they are able to identify running protocols
by default hence creating overhead and it can be switched off. IP address design must be chosen and
developed to fits growth requirements and also well designed routing protocol which support quick
convergence to facilitate proper management. Bandwidth should be chosen based on the required
performance. WAN transport should be design in a way that it will be flexible in case bandwidth
service changes is to be met in future (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Implementation process is the next one now. We have to place the computers and servers in the
convenient place in the room. When the set up is complete, then we can now connect the cables
through all components. We then have to switch on the power then start configuring the router and
switches. This will ensure the correct data flow and also in case of any problem then it will be easy
to solve by checking the affected switch directly. Also conflicts will be eradicated between the
layers of the switch. The all connection is complete and the manager can instruct the employees to
use the network now (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
DESIGNING AND IMPLEMENTATION OF WAN NETWORK
WAN hardware are the physical components in a network set up. These are device that are tangible
such as, laptop, PC, routers, switchers, cables among others. However, wireless network uses
invisible device to transfer information such as invisible radio frequencies or infrared waves. The
path can also be physical also such as cables or invisible wireless. All these components depends on
the customer preference and also the budget (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
In our case, we need a Cisco router, two switches, two servers, cables and two PC's. The type of
connection here will be LAN network which is visible type of connection. As discussed with the
customer, the cost of the devices are affordable and it fits to their budget well therefore we have
made the order to the vendor. The next step is assembling the all components then installing
(BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Using the design have drawn, I have to fix the Cisco router first. The router will distribute WAN
network in this set up of LAN network. Since there are two PC's then each switch will be assigned
to it. We have to use enough cables from router to switches to minims the wastage and of course we
should strictly consider fire code. The strategic place for switches are also important. They should
be very close to PC hence that is realistic positions of it. After all the components are set in place,
we now use cables we have made to connect the network from router through switches to servers
and PC's. After all this is done, the network is now ready to work (Yondri, Irfan, Putri, Zaus, &
Islami, 2019).
We have to analyze network performance after the full installations. Software such as protocol
analyzer and network management software can be used since they are reliable. Analysis of one
month results will be more suitable and very convenient since it shows roughly how network is
being used by employees. The analyzers can show what time does employees uses more network.
During the working hours there is probably less use of network but during free time they use more
internet. The protocol analyzers are very powerful since they are able to identify running protocols
by default hence creating overhead and it can be switched off. IP address design must be chosen and
developed to fits growth requirements and also well designed routing protocol which support quick
convergence to facilitate proper management. Bandwidth should be chosen based on the required
performance. WAN transport should be design in a way that it will be flexible in case bandwidth
service changes is to be met in future (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Implementation process is the next one now. We have to place the computers and servers in the
convenient place in the room. When the set up is complete, then we can now connect the cables
through all components. We then have to switch on the power then start configuring the router and
switches. This will ensure the correct data flow and also in case of any problem then it will be easy
to solve by checking the affected switch directly. Also conflicts will be eradicated between the
layers of the switch. The all connection is complete and the manager can instruct the employees to
use the network now (Yondri, Irfan, Putri, Zaus, & Islami, 2019).

TASK 2
CABLING, SUBNETTING AND INITIAL ROUTER CONFIGURATION
IP Address Ranges
Range Network Address Subnet Mask CIDR Notation
1 192.168.125.0 255.255.255.192 /2
2 192.168.15o.0 255.255.255.192 /2
3 192.168.175.0 255.255.255.192 /2
IP Address Requirements
Networks Number of Hosts
Network 1 Switch 1 – PC 1 – Server 1 2 hosts
Network 2 Switch 2 – PC 2 – Server 2 2 hosts
IP Address Allocation
Device Interface Assigned IP Address
AccessRouter Network 1 interface Last device address - Network 1
Network 2 interface Last device address - Network 2
Switch1 VLAN 1 interface One before the last device address – Network 1
PC1 Network interface 2nd device address - Network 1
Server1 Network interface 1st device address - Network 1
Switch2 VLAN 2 interface One before the last device address – Network 2
PC2 Network interface 2nd device address - Network 2
Switch2 Network interface 1st device address - Network 2
Firmware upgrade on the router
Firmware upgrade on the router is necessary for new features and also security purpose. All the
vulnerabilities that might have been detected will fixed by new features. Also since technology is
advancing then all the time the devices should be in latest version. Upgrading also might means
adding up the new security features that was not there hence improving the new features of the
devices. The general performance also might be improved hence it is most important in the
efficiency of the router (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
CABLING, SUBNETTING AND INITIAL ROUTER CONFIGURATION
IP Address Ranges
Range Network Address Subnet Mask CIDR Notation
1 192.168.125.0 255.255.255.192 /2
2 192.168.15o.0 255.255.255.192 /2
3 192.168.175.0 255.255.255.192 /2
IP Address Requirements
Networks Number of Hosts
Network 1 Switch 1 – PC 1 – Server 1 2 hosts
Network 2 Switch 2 – PC 2 – Server 2 2 hosts
IP Address Allocation
Device Interface Assigned IP Address
AccessRouter Network 1 interface Last device address - Network 1
Network 2 interface Last device address - Network 2
Switch1 VLAN 1 interface One before the last device address – Network 1
PC1 Network interface 2nd device address - Network 1
Server1 Network interface 1st device address - Network 1
Switch2 VLAN 2 interface One before the last device address – Network 2
PC2 Network interface 2nd device address - Network 2
Switch2 Network interface 1st device address - Network 2
Firmware upgrade on the router
Firmware upgrade on the router is necessary for new features and also security purpose. All the
vulnerabilities that might have been detected will fixed by new features. Also since technology is
advancing then all the time the devices should be in latest version. Upgrading also might means
adding up the new security features that was not there hence improving the new features of the
devices. The general performance also might be improved hence it is most important in the
efficiency of the router (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Configuring of the devices
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device (Yondri, Irfan, Putri, Zaus, & Islami, 2019).

Configuring basic router security
Secure Shell (SSH) is the most secured and recommended. It improves and give room for
establishment of network security on the system. Hackers and all malicious persons can’t access or
pass through the system when this used (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Host-name of the router can be configured using SSH.
yourname#configure terminal
yourname (config)#hostname LabRouter
LabRouter(config)#
Password also can be encrypted by use of this feature SSH
Secure Shell (SSH) is the most secured and recommended. It improves and give room for
establishment of network security on the system. Hackers and all malicious persons can’t access or
pass through the system when this used (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Host-name of the router can be configured using SSH.
yourname#configure terminal
yourname (config)#hostname LabRouter
LabRouter(config)#
Password also can be encrypted by use of this feature SSH

TASK 3
STATIC AND DEFAULT ROUTING
IP Address Ranges
Range Network Address Subnet Mask CIDR Notation
4 172.20.125.0 255.255.255.0 /2
5 172.20.150.0 255.255.255.0 /2
6 172.20.175.0 255.255.255.0 /2
IP Address Requirements
Network Number of Hosts
Router 1 / PC-A 6 hosts
Router 2 / PC-B 3 hosts
AccessRouter – Router 1 link 2 addresses only
Router 1 – Router 2 link 2 addresses only
Configuring of the devices
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
STATIC AND DEFAULT ROUTING
IP Address Ranges
Range Network Address Subnet Mask CIDR Notation
4 172.20.125.0 255.255.255.0 /2
5 172.20.150.0 255.255.255.0 /2
6 172.20.175.0 255.255.255.0 /2
IP Address Requirements
Network Number of Hosts
Router 1 / PC-A 6 hosts
Router 2 / PC-B 3 hosts
AccessRouter – Router 1 link 2 addresses only
Router 1 – Router 2 link 2 addresses only
Configuring of the devices
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Configuring basic router security
Secure Shell (SSH) is the most secured and recommended. It improves and give room for
establishment of network security on the system. Hackers and all malicious persons can’t access or
pass through the system when this used (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Host-name of the router can be configured using SSH.
yourname#configure terminal
yourname (config)#hostname LabRouter
LabRouter(config)#
Password also can be encrypted by use of this feature SSH
Secure Shell (SSH) is the most secured and recommended. It improves and give room for
establishment of network security on the system. Hackers and all malicious persons can’t access or
pass through the system when this used (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Host-name of the router can be configured using SSH.
yourname#configure terminal
yourname (config)#hostname LabRouter
LabRouter(config)#
Password also can be encrypted by use of this feature SSH

TASK 4
RIPV2 DYNAMIC ROUTING
IP Address Ranges
Range Network Address Subnet Mask CIDR Notation
7 172.30.150.0 255.255.255.0 /2
8 172.30.175.0 255.255.255.0 /2
9 172.30.200.0 255.255.255.0 /2
IP Address Requirements
Network Number of Hosts
Router 3 / PC-C 6 hosts
Router 4 / PC-D 3 hosts
Router 5 / PC-E 2 host
AccessRouter – Router 3 link 2 addresses only
Router 3 – Router 4 link 2 addresses only
Router 3 – Router 5 link 2 addresses only
Configuring of the devices
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device. Secure Shell (SSH) is the most secured and recommended. It improves
and give room for establishment of network security on the system. Hackers and all malicious
persons can’t access or pass through the system when this used (Yondri, Irfan, Putri, Zaus, & Islami,
2019).
RIPV2 DYNAMIC ROUTING
IP Address Ranges
Range Network Address Subnet Mask CIDR Notation
7 172.30.150.0 255.255.255.0 /2
8 172.30.175.0 255.255.255.0 /2
9 172.30.200.0 255.255.255.0 /2
IP Address Requirements
Network Number of Hosts
Router 3 / PC-C 6 hosts
Router 4 / PC-D 3 hosts
Router 5 / PC-E 2 host
AccessRouter – Router 3 link 2 addresses only
Router 3 – Router 4 link 2 addresses only
Router 3 – Router 5 link 2 addresses only
Configuring of the devices
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device. Secure Shell (SSH) is the most secured and recommended. It improves
and give room for establishment of network security on the system. Hackers and all malicious
persons can’t access or pass through the system when this used (Yondri, Irfan, Putri, Zaus, & Islami,
2019).

Configure RIPv2 dynamic routing
RIPv2 configurations is very direct process. RIP is only enabled in router RIP global configuration
command. Next step is giving instructions the router to utilize RIPv2 by keying version 2 in
command prompt. Finally you inform RIP which type of network to advertise by use of one or more
network commands. First commands are more straightforward but the last commands requires a
little bit of clever thoughts. These commands will evaluate which routing process to take place
(BShara, Tracy, Callaghan, ... & Crabbe, 2019).
RIPv2 configurations is very direct process. RIP is only enabled in router RIP global configuration
command. Next step is giving instructions the router to utilize RIPv2 by keying version 2 in
command prompt. Finally you inform RIP which type of network to advertise by use of one or more
network commands. First commands are more straightforward but the last commands requires a
little bit of clever thoughts. These commands will evaluate which routing process to take place
(BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

TASK 5
EIGRP Dynamic Routing
IP Address Ranges
Range Network Address Subnet Mask CIDR Notation
10 192.168.225.0 255.255.255.0 /2
11 192.168.235.0 255.255.255.0 /2
12 192.168.245.0 255.255.255.0 /2
IP Address Requirements
Network Number of Hosts
Router 7 / PC-C 6 hosts
Router 8 / PC-D 3 hosts
Router 9 / PC-E 2 host
AccessRouter – Router 7 link 2 addresses only
Router 7 – Router 8 link 2 addresses only
Router 7 – Router 9 link 2 addresses only
Configuring of the devices
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device. Secure Shell (SSH) is the most secured and recommended. It improves
and give room for establishment of network security on the system. Hackers and all malicious
persons can’t access or pass through the system when this used (Yondri, Irfan, Putri, Zaus, & Islami,
2019).
EIGRP Dynamic Routing
IP Address Ranges
Range Network Address Subnet Mask CIDR Notation
10 192.168.225.0 255.255.255.0 /2
11 192.168.235.0 255.255.255.0 /2
12 192.168.245.0 255.255.255.0 /2
IP Address Requirements
Network Number of Hosts
Router 7 / PC-C 6 hosts
Router 8 / PC-D 3 hosts
Router 9 / PC-E 2 host
AccessRouter – Router 7 link 2 addresses only
Router 7 – Router 8 link 2 addresses only
Router 7 – Router 9 link 2 addresses only
Configuring of the devices
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device. Secure Shell (SSH) is the most secured and recommended. It improves
and give room for establishment of network security on the system. Hackers and all malicious
persons can’t access or pass through the system when this used (Yondri, Irfan, Putri, Zaus, & Islami,
2019).

Configure EIGRP dynamic routing
Enabling EIGRP is one in two steps. First, activate EIGRP by enabling it in routing protocol from
global configuration mode. second, inform EIGRP which interfaces that we would like to include.
By simply typing in this commands;
Router(config)# router eigrp autonomous_system_#
Router(config-router)# network IP_network_# [subnet_mask]
Router(config)# router eigrp autonomous_system_#
It will enable the EIGRP routing protocol in router. This commands will guide us which local
interface to include in EIGRP (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Enabling EIGRP is one in two steps. First, activate EIGRP by enabling it in routing protocol from
global configuration mode. second, inform EIGRP which interfaces that we would like to include.
By simply typing in this commands;
Router(config)# router eigrp autonomous_system_#
Router(config-router)# network IP_network_# [subnet_mask]
Router(config)# router eigrp autonomous_system_#
It will enable the EIGRP routing protocol in router. This commands will guide us which local
interface to include in EIGRP (BShara, Tracy, Callaghan, ... & Crabbe, 2019).

TASK 6
TROUBLESHOOTING REFLECTION
Defining the Problem
There are several problems that might be faced. Let's take example "The mail server isn't working".
This might be because of network issues or the browser. The page shows you don't have permission
to access. This means that you can't send or receive email. To save time, you have to identify the
real problem before troubleshooting. Then after vitrifaction and definition of the problem then it is
time to work on it now. Accurate definition of problem will help to avoid false troubleshooting
(Yondri, Irfan, Putri, Zaus, & Islami, 2019).
Gathering and Analyzing Information
Troubleshooting method should be prior to everything. Also information gathering plan should be
priority as well. We need to know the target of the devices we want to collect information. Also we
need to know the target devices or clients. Next we have to gain access to spot the targets. In most
cases you need to gain access through the devices you normal use or the devices which are safely
kept for authority access only. If in any case it is under authorized personnel's then you have to let
them know by giving out the valid reasons. After having that opportunity to troubleshoot, then try
several methods and collect the results for analysis. The problem will be correctly identified and the
relevant department or expert can be given to solve (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Formulating/Testing a Hypothesis
The problem has been identified and the next step is to solve. The right tools should be used for
appropriate solutions and to avoid future problems. In our case, email not sending or receiving will
be solved appropriately by using the perfect methods such as clearing caches and also checking the
security of the browsers due to vulnerabilities. Assumptions made also have so impacts because if it
doesn't work then obviously you have to go back and reexamine. Precautions are required here to
avoid going back to the start (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
Solving the Problem
This is the final stage of the all process. The possible problem cause is no officially presented for
action to be taken. In this stage, the only problem is to identify the correct and accurate methods of
solving the problem. The solutions is expected to give out perfect results (BShara, Tracy,
Callaghan, ... & Crabbe, 2019).
TROUBLESHOOTING REFLECTION
Defining the Problem
There are several problems that might be faced. Let's take example "The mail server isn't working".
This might be because of network issues or the browser. The page shows you don't have permission
to access. This means that you can't send or receive email. To save time, you have to identify the
real problem before troubleshooting. Then after vitrifaction and definition of the problem then it is
time to work on it now. Accurate definition of problem will help to avoid false troubleshooting
(Yondri, Irfan, Putri, Zaus, & Islami, 2019).
Gathering and Analyzing Information
Troubleshooting method should be prior to everything. Also information gathering plan should be
priority as well. We need to know the target of the devices we want to collect information. Also we
need to know the target devices or clients. Next we have to gain access to spot the targets. In most
cases you need to gain access through the devices you normal use or the devices which are safely
kept for authority access only. If in any case it is under authorized personnel's then you have to let
them know by giving out the valid reasons. After having that opportunity to troubleshoot, then try
several methods and collect the results for analysis. The problem will be correctly identified and the
relevant department or expert can be given to solve (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Formulating/Testing a Hypothesis
The problem has been identified and the next step is to solve. The right tools should be used for
appropriate solutions and to avoid future problems. In our case, email not sending or receiving will
be solved appropriately by using the perfect methods such as clearing caches and also checking the
security of the browsers due to vulnerabilities. Assumptions made also have so impacts because if it
doesn't work then obviously you have to go back and reexamine. Precautions are required here to
avoid going back to the start (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
Solving the Problem
This is the final stage of the all process. The possible problem cause is no officially presented for
action to be taken. In this stage, the only problem is to identify the correct and accurate methods of
solving the problem. The solutions is expected to give out perfect results (BShara, Tracy,
Callaghan, ... & Crabbe, 2019).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Conclusion
We have to analyze network performance after the full installations. Software such as protocol
analyzer and network management software can be used since they are reliable. Analysis of one
month results will be more suitable and very convenient since it shows roughly how network is
being used by employees. The analyzers can show what time does employees uses more network.
During the working hours there is probably less use of network but during free time they use more
internet. The protocol analyzers are very powerful since they are able to identify running protocols
by default hence creating overhead and it can be switched off. IP address design must be chosen and
developed to fits growth requirements and also well designed routing protocol which support quick
convergence to facilitate proper management. Bandwidth should be chosen based on the required
performance. WAN transport should be design in a way that it will be flexible in case bandwidth
service changes is to be met in future (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
We have to analyze network performance after the full installations. Software such as protocol
analyzer and network management software can be used since they are reliable. Analysis of one
month results will be more suitable and very convenient since it shows roughly how network is
being used by employees. The analyzers can show what time does employees uses more network.
During the working hours there is probably less use of network but during free time they use more
internet. The protocol analyzers are very powerful since they are able to identify running protocols
by default hence creating overhead and it can be switched off. IP address design must be chosen and
developed to fits growth requirements and also well designed routing protocol which support quick
convergence to facilitate proper management. Bandwidth should be chosen based on the required
performance. WAN transport should be design in a way that it will be flexible in case bandwidth
service changes is to be met in future (Yondri, Irfan, Putri, Zaus, & Islami, 2019).

References
1. BShara, N., Tracy, L. T., Volpe, T. A., Davis, M. B., Kelly, M. N., Callaghan, S., ... & Crabbe, E.
(2019). U.S. Patent Application No. 10/284,460.
2. Yondri, S., Irfan, D., Putri, M., Zaus, M. A., & Islami, S. (2019). Evaluation of Packet Tracer
Application Effectiveness in Computer Design Networking Subject. International Journal on
Advanced Science, Engineering and Information Technology, 9(1), 54-59.
1. BShara, N., Tracy, L. T., Volpe, T. A., Davis, M. B., Kelly, M. N., Callaghan, S., ... & Crabbe, E.
(2019). U.S. Patent Application No. 10/284,460.
2. Yondri, S., Irfan, D., Putri, M., Zaus, M. A., & Islami, S. (2019). Evaluation of Packet Tracer
Application Effectiveness in Computer Design Networking Subject. International Journal on
Advanced Science, Engineering and Information Technology, 9(1), 54-59.
1 out of 15
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.