[Paper Keywords] Classification, handling and maintenance of network faults [Abstract] This paper classifies the common faults in the network, puts forward corresponding solutions for various common network faults, and summarizes how to strengthen network maintenance. ?
Network failure is a very common thing, with various types. It is very important to maintain the problem in time when the network fails and restore the normal operation of the network as quickly as possible, and to master a set of effective network maintenance theories and technologies.
First, the classification of computer network failures
Computer network failure mainly refers to the problems that occur when users use the computer network or the network is running, which leads to the computer network not being used normally. Generally, computer network faults can be divided into fault and non-fault according to their nature.
(1) physical failure
Physical failure, that is, hardware failure, generally refers to network equipment or line damage, loose interface, serious line interference, and network connection errors caused by human factors. When this kind of fault occurs, it usually appears as disconnection or intermittence. Physical failures mainly include:
(1) line fault
In daily network maintenance, the incidence of line faults is very high, accounting for about 60% ~ 70% of network faults. Line failures include line damage and serious interference.
(2) Interface failure
Interface failures usually include loose plugs and physical damage to the port itself. For example, a damaged twisted pair RJ45 connector.
(3) Switch or router failure
The switch or router fault here refers to the situation that the equipment is physically damaged and can't work normally, which leads to the network can't work normally.
(4) Network card failure
Network cards, also known as network adapters, are mostly installed inside the host. Through the host configuration and. Network card failures mainly include network card looseness, host network card slot failure, network card physical failure and so on.
(2) Logical failure
Logical fault, also known as software fault, mainly refers to network abnormality caused by software installation or network equipment configuration error. Compared with hardware failure, logical failure is often much more complicated. Common network logic faults include: host logic fault, process or port fault, router fault, etc.
(1) host logic failure
Host logic failures usually include incorrect installation of network card drivers, network communication protocols or services, and incorrect configuration of network address parameters. For computer network users, this kind of fault is one of the most common network faults.
(2) process or port failure
Process or port failure refers to the situation that some processes or ports related to network connection are unexpectedly closed due to the influence of virus or system. For example, port 80 of WWW server was unexpectedly closed, which made the Web service it provided inaccessible.
(3) Router logic failure
Router logic failures usually include router configuration errors, high CPU utilization, wrong port parameters, and small memory margin. Typical router logic failures include routing cycle caused by routing configuration errors and degradation of network service quality caused by high CPU utilization.
Second, the handling of common faults in computer networks
When the computer network breaks down, we can analyze and deal with the network link, server and client respectively according to our own experience. For servers and clients, we can diagnose and troubleshoot their hardware, software, drivers, applications, settings and viruses. For the network link, various test tools or test software can be used to help diagnose and investigate the cause of the fault. It should be said that ordinary people can quickly master the common faults of computer networks, and it is easy to accumulate experience as long as they use snacks and pay attention to observation and accumulation.
(1) The local connection is disconnected.
For this kind of network fault, firstly, through empirical analysis, it can be judged that this kind of fault is mostly physical fault, that is, hardware fault; Secondly, according to the bottom-up idea of seven-layer network structure model analysis, it can be determined that the fault should occur in the physical layer; Finally, use line tester and other tools to test whether the network cable, interface, network card and switch port are normal.
(2) Limited or no local connection.
This kind of fault is generally a logical fault. Usually, you can check the configuration of IP address and other parameters, the setting of network equipment and the installation of network protocol one by one, find out the source of the fault, and repair the fault or reinstall some software.
(3) The local connection is normal, but the browser cannot access the webpage.
Through empirical analysis, it can be found that most of these failures are logical failures, and they are complicated and can be subdivided into the following situations: using IP addresses and domain names can not access web pages. Most of this happens because the browser itself is faulty or tampered with by malicious software, which makes it impossible to browse the web. You can try to use 360 security guards and other repair software to repair the browser, or reinstall the browser and use another browser Firefox browser. You can use an IP address to access web pages, but you can't use a domain name. In this case, the DNS configuration is probably wrong. You can check whether the DNS configuration is correct. You can use QQ and other network software, but you can't access the webpage. This situation is similar to the first one. You can refer to the fault handling method in the first case.
Third, how to strengthen the maintenance of the network.
(a) in a nutshell, should do:
(1) Strengthening the authority of computer network
The management of servers is the responsibility of network administrators and server administrators. According to the purpose of the server and the work responsibilities and permissions of relevant users, the corresponding security policies are formulated to strictly control the transparent operation of the server by ordinary users. The management of routers, lan switches and firewalls can only be carried out by network administrators and authorized personnel, and no other personnel are allowed to participate. Access management of information network and national public Internet shall be formulated by the network administrator according to relevant documents. It is forbidden to download useless files to prevent virus infection.
(2) Strengthen the integrity check of the system.
The network administrator should check the integrity of the network every week. All areas on the server that contain confidential data must be converted to NTFS format; Storing and reading any data on the network requires password login. Running NetWare often? Security guard? Utility, find out the weakest link in the network system, check and plug potential loopholes.
(3) Information encryption strategy
There are three common methods of network encryption: link encryption, endpoint encryption and node encryption. The purpose of link encryption is to protect the security of link information between network nodes; The purpose of endpoint encryption is to protect data from source users to destination users; The purpose of node encryption is to protect the transmission link between source node and destination node. Users can choose the above encryption method according to the network situation. The information encryption process provides strong security protection at a small cost. In most cases, information encryption is the only way to ensure the confidentiality of information.
(4) Strengthen access control and supervise the normal operation of computer network system.
Access control is the main measure to prevent and protect network security. Its task is to ensure that network resources are not used and accessed by illegal users, and it is one of the most important core strategies of network security. Network administrators should be able to control and restrict the account usage of ordinary users and the time and manner of accessing the network. User name or user account is the most basic form of security in all computer systems, and user accounts can only be established by system administrators. Should users submit user passwords to access the network? Documents? Users can modify their own passwords, but the system administrator should be able to control the following restrictions of passwords: minimum password length, time interval of forced password modification, uniqueness of passwords, and grace times allowed to access the network after the password expires.
(2) Specifically, we should:
(1) Hardware maintenance
The daily inspection of computer hardware plays a very important role in computer maintenance, which is helpful to the normal use of hardware and the prevention of network failures. Generally, check the network card, hub, network cable, router, switch and other faults first, and then check whether the computer hard disk, monitor, memory and other operations are normal. The faulty computer hardware needs to be repaired or replaced in time. In addition, it is necessary to ensure that the hardware of networked computers can meet the most basic networking conditions in order to network normally.
(2) Software maintenance
① Check the security performance of the network: it mainly includes the regular upgrade and maintenance of the installed anti-virus software, the irregular version upgrade of the firewall, the encryption of the database and the regular update of its encryption means and methods.
② Regular inspection of network equipment: mainly the inspection of network equipment such as switches, hubs and routers. Generally check its running status and whether the system configuration of the system is normal.
③ Regularly check the computer network settings: mainly including checking whether the server works normally, whether the access is normal, and whether the network protocols and services are normal.
(3) Viral type
A computer virus is a program, an executable code. Just like biological viruses, computer viruses have unique replication capabilities. Computer viruses spread quickly and are usually difficult to eradicate. They can be attached to various texts. When files are copied or transferred from one user to another, they will spread with the files. In addition to replication ability, some computer viruses have other common features: contaminated programs can spread virus vectors. When you see that virus carriers only appear in words and images, they may have destroyed files, reformatted your hard disk or caused other types of disasters. If the virus is not parasitic on the infected program, it will still bring you trouble by occupying storage space and reducing the overall performance of the computer. Do a good job in virus prevention: first of all, don't use disks of unknown origin or disks before use. You should first check whether there is a virus and kill it in time. Secondly, don't open emails of unknown origin. Third, don't log on to illegal and bad websites. Fourth, install anti-virus software, update virus database in time, monitor at any time, and often kill viruses and malicious plug-ins.
When doing computer maintenance, it is worth emphasizing that network security should be put at the top of the whole security system at all times, and efforts should be made to improve the security awareness and basic maintenance technology of all network users. This is of great significance to improve the security and normal operation of the whole network.
References:
[1] Zhang Lingjie. Network fault detection and maintenance [M] Press, 2006, 12.
[2] Li Lianye. Computer Network Fault Diagnosis and Troubleshooting [M]. Tsinghua University Publishing House, 2007,3.
[3] Yang Chuang. Network planning and implementation [M]. Higher Education Press, 2005, 12.
See more related papers: e-commerce graduation thank-you letter, research report graduation thesis, and the cultivation of college students' entrepreneurial psychological quality.
;