answersLogoWhite

0

There are lot of concerns that cause network delays, The Administrator / Network Enginrer must check the following simple tasks before he / she proceed.

 get the user(s) to demonstrate the problem.

 determine how many other users are affected.

 ensure desktop hardware and configuration is OK.

 trace all connections (they may be on another subnet).

 commence some monitoring or diagnostics.

 determine problem (if there is one).

 check for the virus / spyware activity.

 If everything seems OK, then try to restart the router / switch, same time try to restart the system.

User Avatar

Wiki User

14y ago

What else can I help you with?

Continue Learning about Computer Science

What is the purpose of a network tap?

A network tap enables a machine to access data using dark (i.e. unused) fiber in a multi-strand cable. Typically, a network tap comes in the form of hardware for users.


Why computer users prefer using package software as compared to tailor made systems?

cost, support network, availability,


Can you explain how to troubleshoot network issues using Wireshark, specifically focusing on the keyword "fin, ack"?

To troubleshoot network issues using Wireshark, focus on the keyword "fin, ack." This refers to the final acknowledgment in a TCP connection termination. Look for packets with this keyword to identify any issues with the closing of connections, such as delays or errors. Analyze these packets to pinpoint the source of the problem and take appropriate action to resolve it.


What facilities are available to user when using a network?

Putting this question on this site is one example of using a network. Any network will allow some things and block other things depending on which network you are using. That is why effectively all networks have a Network Administrator who has the job of making sure that people can use the network safely for the purpose the network was set up for


What is the purpose of using CheckPoint VPN programs?

CheckPoints VPN programs are used for simplicity in creating and managing a VPN, or Virtual Private Network. Their programs allow the user to easily manage and control their VPN for privacy and security, from nearly anywhere.

Related Questions

Because of an increasing number of users bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance What can be done to improve the user experience?

Reduce the number of devices using each channel.


What is BYOD?

BYOD let the users to be free using/access to the campus network from their personal devices


What is beat100?

Beat100.com is a social music and lifestyle network which allows users to connect and network using all the popular social networking tools.


Why would an ISP require a CMTS device on their network?

to connect end users using cable technology


What security component provides the strongest wayof preventing unwanted users from using a wireless network?

Authentication


Most instant messaging systems today use a centralized index for locating users Consider instead using an overlay network with query flooding like Gnutella for locating users Describe how this?

network test is shut up


Where can one make their network private?

One can set up their private network using many different methods. One method is to place a WEP on one's network, to at least prevent casual users from entering.


What is the purpose of a network tap?

A network tap enables a machine to access data using dark (i.e. unused) fiber in a multi-strand cable. Typically, a network tap comes in the form of hardware for users.


A network administrator is designing a network for a new branch office of twenty-five users What are the advantages of using a client-server model?

In that way it's much easier to control network, maintenance, and control user computers.


Why computer users prefer using package software as compared to tailor made systems?

cost, support network, availability,


What is RBACL?

RBACL stands for a role-based access control list. It is a way to restrict access to a system or computer network to authorized users only. You can assign users specific roles using RBACL.


WhAT configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using a Telnet connection?

line vty